Re: Intermittent issues resolving "labor.upload.akamai.com"

2023-02-03 Thread Greg Choules via bind-users
Hi Sandeep.
>From a quick look in Wireshark at what my own server (9.18.8) is doing,
this looks like Akamai not responding correctly to a BIND QNAME
minimisation query. Here's one response, from 95.101.36.192 for example, of
many similar ones showing an issue. The response code shouldn't be REFUSED:

Domain Name System (response)
Transaction ID: 0x87ea
Flags: 0x8005 Standard query response, Refused
1...    = Response: Message is a response
.000 0...   = Opcode: Standard query (0)
 .0..   = Authoritative: Server is not an authority for
domain
 ..0.   = Truncated: Message is not truncated
 ...0   = Recursion desired: Don't do query recursively
  0...  = Recursion available: Server can't do
recursive queries
  .0..  = Z: reserved (0)
  ..0.  = Answer authenticated: Answer/authority
portion was not authenticated by the server
  ...0  = Non-authenticated data: Unacceptable
   0101 = Reply code: Refused (5)
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 1
Queries
_.stor.lb.akamai.net: type A, class IN
Name: _.stor.lb.akamai.net
[Name Length: 20]
[Label Count: 5]
Type: A (Host Address) (1)
Class: IN (0x0001)
Additional records
: type OPT
Name: 
Type: OPT (41)
UDP payload size: 4096
Higher bits in extended RCODE: 0x00
EDNS0 version: 0
Z: 0x8000
1...    = DO bit: Accepts DNSSEC security RRs
.000    = Reserved: 0x
Data length: 0

I haven't tested this on 9.18.10 or ..11 yet. But the behaviour of QM
hasn't changed.

I would advise you to run this on a non-production server, capture all
packets to disc and make some test queries to it until you see the issue,
to see what the server is actually doing.

I hope that helps, Greg

On Thu, 2 Feb 2023 at 23:43, Bhangui, Sandeep - BLS CTR via bind-users <
bind-users@lists.isc.org> wrote:

> Hi
>
> We are running ISC DNS Bind Version 9.18.10 ( will soon be moving to
> 9.18.11) on our Linux Servers.
>
> DNS resolution in general seems to work just fine as expected.
>
> It seems we have intermittent issues resolving "labor.upload.akamai.com"
> and then some scripts fail. It is clear that the failure of the script is
> due to DNS name lookup.
>
> Not sure if this is an issue that needs to be looked up at our end ( since
> DNS as such is working just fine for all the rest of the name resolution)
> or things are not configured properly at other end as far as how this DNS
> record is published and due to which I see the behavior of intermittent dns
> name lookup failure.
>
> Any pointers would be appreciated.
>
> Thanks
> Sandeep
>
> dig labor.upload.akamai.com
>
> ; <<>> DiG 9.18.10 <<>> labor.upload.akamai.com
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 51211
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 1232
> ; COOKIE: 17e14f79ba23179d010063dc4895fbcf47353a31763c (good)
> ;; QUESTION SECTION:
> ;labor.upload.akamai.com.   IN  A
>
> ;; Query time: 1203 msec
> ;; SERVER: 127.0.0.1#53(127.0.0.1) (UDP)
> ;; WHEN: Thu Feb 02 18:34:45 EST 2023
> ;; MSG SIZE  rcvd: 80
>
>
> But if I point to a public DNS server like VZ or google I seem to resolve
> it fine all the time.
>
> dig @198.6.1.1 labor.upload.akamai.com
>
> ; <<>> DiG 9.18.10 <<>> @198.6.1.1 labor.upload.akamai.com
> ; (1 server found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 43891
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 512
> ;; QUESTION SECTION:
> ;labor.upload.akamai.com.   IN  A
>
> ;; ANSWER SECTION:
> labor.upload.akamai.com. 300IN  CNAME
> labor.c-ftp.upload.akamai.com.
> labor.c-ftp.upload.akamai.com. 900 IN   CNAME
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net.
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.137
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.149
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.144
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.143
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.142
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.148
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.139
> r33674-33729.neards.1.cftp.e.stor.lb.akamai.net. 23 IN A 23.200.4.146
>
> ;; Query time: 202 msec
> ;; SERVER: 198.6.1.1#53(198.6.1.1) (UDP)
> ;; WHEN: Thu Feb 02 18:35:50 EST 2023
> ;; MSG SIZE  r

Re: Intermittent issues resolving "labor.upload.akamai.com"

2023-02-03 Thread Darren Ankney
Since the dig output shows "SERVFAIL" it could also be this bug:

* When an outgoing request timed out, named would retry up to three
times with the same server instead of trying the next available name
server. This has been fixed. [GL #3637]

that was fixed in 9.18.11
(https://bind9.readthedocs.io/en/v9_18_11/notes.html#bug-fixes)
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Requesting Update-Policy Statements Sanity Check, Please

2023-02-03 Thread Darren Ankney
You would probably need to attach your entire named.conf file (with
sensitive bits (keys and the like) redacted and perhaps subnets
obscured to examples such as 192.0.2.0/24, for example) before anyone
would be able to help you.

That being said, your update policy statements don't look correct to
me. Have you tried to load them with BIND?  Do they pass syntax check?
 The reason they don't look right is that they seem to follow this
format correctly:

# (grant | deny ) identity ruletype  name   types

but  include the word "name" which I think is meant to be replaced
with your actual domain name (ie: I don't think the word "name" should
be in the policy).

I have not previously used update-policy but I'd think it should be like this:

update-policy {grant   A ;};

from reading: 
https://bind9.readthedocs.io/en/v9_18_11/reference.html#namedconf-statement-update-policy
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Requesting Update-Policy Statements Sanity Check, Please

2023-02-03 Thread Jan-Piet Mens

You would probably need to attach your entire named.conf file (with
sensitive bits (keys and the like) redacted 


named-checkconf -px 


is your friend: prints out the named.conf and included files in canonical form
if no errors were detected and obscures shared secrets by replacing them with
strings of question marks (?)

-JP
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Requesting Update-Policy Statements Sanity Check, Please

2023-02-03 Thread Mark Andrews


> On 3 Feb 2023, at 21:47, Darren Ankney  wrote:
> 
> You would probably need to attach your entire named.conf file (with
> sensitive bits (keys and the like) redacted and perhaps subnets
> obscured to examples such as 192.0.2.0/24, for example) before anyone
> would be able to help you.
> 
> That being said, your update policy statements don't look correct to
> me. Have you tried to load them with BIND?  Do they pass syntax check?
> The reason they don't look right is that they seem to follow this
> format correctly:
> 
> # (grant | deny ) identity ruletype  name   types
> 
> but  include the word "name" which I think is meant to be replaced
> with your actual domain name (ie: I don't think the word "name" should
> be in the policy).

No, “name” there is the rule type.  

> I have not previously used update-policy but I'd think it should be like this:
> 
> update-policy {grant   A ;};

This leaves out rule type.

> 
> from reading: 
> https://bind9.readthedocs.io/en/v9_18_11/reference.html#namedconf-statement-update-policy

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Requesting Update-Policy Statements Sanity Check, Please

2023-02-03 Thread Mark Andrews
You need to replace the rule type with something more appropriate for the type 
of update being preformed.  For the updates made by the DHCP server I would use 
“zonesub”.  “name” is fine for LetsEncrypt.

update-policy {grant update-key zonesub A ;};
update-policy {grant update-key zonesub PTR;};

   ``zonesub``
   This rule is similar to subdomain, except that it matches when the name 
being updated is a subdomain of the zone in which the :any:`update-policy` 
statement appears. This obviates the need to type the zone name twice, and 
enables the use of a standard :any:`update-policy` statement in multiple zones 
without modification. When this rule is used, the ``name`` field is omitted.


> On 3 Feb 2023, at 18:04, duluxoz  wrote:
> 
> Hi All,
> 
> I'm pretty new to configuring Bind and so it would be great if someone(s) 
> could just check my code re: the update-policy zone command(s) below - thanks 
> in advance.
> 
> For the first zone (a regular internal forward-lookup zone) I'd like to be 
> able to update (from Kea via ddns) the zone when a new host is assigned/etc a 
> DHCP lease:
> 
> update-policy {grant update-key name internal-forward-lookup.local A ;};
> 
> For the second zone (a regular internal reverse-lookup zone for the 
> 192.168.1.0/24 network) I'd like to be able to update (from Kea via ddns) the 
> zone when a new host is assigned a DHCP lease (obviously I've got an 
> equivalent IPv6 reverse-lookup zone :-) ):
> 
> update-policy {grant update-key name 1.168.192.IN-ADDR.ARPA PTR;};
> 
> For the third zone (a regular external forward-lookup zone) I'd like to be 
> able to update (via acme.sh/LetsEncrypt) the _acme-challenge.example.com TXT 
> record when a Certificate is requested/renewed:
> 
> update-policy {grant update-key name _acme-challenge.example.com TXT;};
> 
> I've got the update-key configured and available on all the necessary boxes, 
> etc, and dns (for fixed IP addresses) and dhcp are working - I just need to 
> get these update-policy statements correct.
> 
> 
> Any help is greatly appreciated - and again, thanks in advance
> 
> Cheers
> 
> Dulux-Oz

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users