"not exact" error message

2023-01-21 Thread Havard Eidnes via bind-users
Hi,

I tried using BIND 9.18.10 as a downstream name server of an
OpenDNSSEC 2.1.8 installation, but after sorting out the ACL
issues on the OpenDNSSEC side, zone transfers failed with
messages such as these:

Jan 21 17:15:34 new-ns named[22056]: transfer of '4.38.158.in-addr.arpa/IN' 
from 158.38.x.yy#53: failed while receiving responses: not exact
Jan 21 17:16:42 new-ns named[22056]: transfer of 'ufisa.no/IN' from 
158.38.x.yy#53: failed while receiving responses: not exact

Downgrading BIND to 9.16.36 made this work, so this appears to be
a new consistency check introduced with the newer version which
isn't being done by 9.16.36.

Any idea what this new check consists of, and what I should hint
to the OpenDNSSEC developers to fix?

I did a "dig axfr -y " of one of the zones from the
OpenDNSSEC host, and I found the TSIG record used to support the
zone transfer embedded in the result (twice!), and when I fed the
resulting file to named-checkzone, it didn't want to validate the
zone before I removed the two TSIG records.  This, however, may
be unrelated; I do not know.

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: "not exact" error message

2023-01-21 Thread Havard Eidnes via bind-users
> The consistency checks are not new. The message indicates that
> the IXFR contained a delete request for a record that doesn't
> exist or an add for a record that exists. Named recovers be
> performing an AXFR of the zone.

Interesting.

BIND 9.16.36 does not produce this log message, so it was easy to
be misled to conclude that this was a new consistency check.
Does 9.16.36 and 9.18.10 behave differently in terms of their
usage of IXFR?

The log message BIND 9.18.10 produces does not mention IXFR or
that it's going to fallback to AXFR.  I mis-interpreted it as a
fatal error message, and downgraded to BIND 9.16.36 without
verifying whether 9.18.10 actually worked as intended anyway (it
does, I just re-instaled 9.18.10 and re-signed a zone and
verified that it makes it through).

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


rpz testing -> shut down hung fetch while resolving

2023-01-26 Thread Havard Eidnes via bind-users
Hi,

I recently made an upgrade of BIND to version 9.18.11 on our
resolver cluster, following the recent announcement.  Shortly
thereafter I received reports that the validation that lookups of
"known entries" in our quite small RPZ feed (it's around 1MB
on-disk) no longer succeeds as expected, but instead take a long
time, finally gives SRVFAIL to the client, and associated with
this we get this log message:

Jan 26 18:41:27 xxx-res named[6179]: shut down hung fetch while resolving 
'known-rpz-entry.no/A'

Initially I thought that this was new behaviour between BIND
9.18.10 and 9.18.11, but after downgrading to 9.18.10 on one of
the affected nodes, this problem is still observable there.
Also, only a subset of our 4 nodes exhibit this behaviour,
despite the unaffected ones running 9.18.11, which is quite
strange.  None of the name servers are under severe strain by any
measure -- one affected sees around 200qps, another around 50qps
at the time of writing.

I want to ask if this sort of issue is already known (I briefly
searched the issues on ISC's gitlab and came up empty), and also
to ask if there is any particular sort of information I should
collect to narrow this down if it is a new issue.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: rpz testing -> shut down hung fetch while resolving

2023-01-28 Thread Havard Eidnes via bind-users
>> I recently made an upgrade of BIND to version 9.18.11 on our
>> resolver cluster, following the recent announcement.  Shortly
>> thereafter I received reports that the validation that lookups of
>> "known entries" in our quite small RPZ feed (it's around 1MB
>> on-disk) no longer succeeds as expected, but instead take a long
>> time, finally gives SRVFAIL to the client, and associated with
>> this we get this log message:
>>
>> Jan 26 18:41:27 xxx-res named[6179]: shut down hung fetch while resolving 
>> 'known-rpz-entry.no/A'
>
> This usually means there's a circular dependency somewhere in the
> resolution or validation process. For example, we can't resolve a name
> without looking up the address of a name server, but that lookup can't
> succeed until the original name is resolved. The two lookups will wait on
> each other for ten seconds, and then the whole query times out and issues
> that log message.
>
> The log message is new in 9.18, but the 10-second delay and SERVFAIL
> response would probably have happened in earlier releases as well.

This turned out to be related to the fact that we had configured
query forwarding from two of our nodes to two of the others with
the intention to build a larger central cache, and improve query
response time for the resolvers which did that forwarding.

Once I commented out the query forwarding, this problem no longer
occurred. Our forwarding config was of this form:

  forwarders {
  128.39.x.y;
  158.38.z.r;
  };
  // But if both are dead (unlikely), do resolution ourselves
  forward first;

This part is now commented out and I've done "rndc reconfig", and
the SERVFAIL responses to the "known rpz-blocked entries" no
longer occur.  But ... the two resolvers will now have to build a
cache of their own, and do not benefit from the cache built on
the two more "central" nodes.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Converting between zone file formats

2023-01-30 Thread Havard Eidnes via bind-users
Hi,

by default, the files written by BIND when acting as a slave is
not in "text" format, but is some binary file format, I beleive
what is referred to as "raw" format.

Once in a while it's desireable to be able to see the contents of
the slave zone file as plain text.  To that end I have previously
used named-compilezone to do this with

named-compilezone \
-q -j -f raw -F text -o - \
$z \
$directory/$z

However... This does not appear to work anymore.

Earlier I ran BIND 9.16 on this host, but it has been upgraded to
9.18 (built and installed from local source).  It seems that a
while back (probably in the 9.16 era), named-compilezone was
changed to a symlink to named-checkzone, and it also looks like
BIND 9.18 no longer installs named-checkzone, so what I have as
named-checkzone appears to come from BIND 9.16.

Trying to use the procedure as above results in a named-checkzone
which hangs in select(), which is a bit strange when it's only
supposed to act on local files?!?

What should I now use instead of the above to convert the binary
zone file to back to the textual master zone file format?  Please
don't say "that's not possible"...

(This might be important to be able to do if an upstream suffers
a catastrophe of some sort, as a step along the path to convert
this name server to be a master for the zone in question.  Being
a master implies being able to modify the zone, and doing that
with a binary file is ... slightly inconvenient.)

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Converting between zone file formats

2023-01-30 Thread Havard Eidnes via bind-users
> Named-checkzone and named-compilezone are the same executable.
> Named-checkzone looks up remote records to more completely
> detect configuration errors.  See the man page for details.

Thanks for the hint, I apparently need to complicate my script
even more to avoid the network lookups.

You didn't answer, though, whether the 9.16 named-checkzone will
be able to read & correctly interpret the binary zone files 9.18
stores in the file system, or whether there is some other and
more preferable way to accomplish what I want, either with 9.18
itself or otherwise.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Delegation NS-records when zones share an authority server

2023-04-12 Thread Havard Eidnes via bind-users
> I suspect you don't need the NS records in challenge.state.ak.us and
> if you remove them then the records in challenge.state.ak.us are
> simply part of the state.ak.us zone since they're served off of the
> same server.

Unfortunately "not quite".

While a publishing name server will respond with data from the most
specific zone available to it when queried (e.g. for the NS records
for challenge.state.ak.us), this "overriding" or "leakage" does not
happen when you do a zone transfer of the parent zone (state.ak.us).

So ... if you have a publishing name server which is a name server for
state.ak.us and not for challenge.state.ak.us, it will *not* have the
delegation NS RRset for challenge.state.ak.us, and if a recursor
happens to query this particular publishing name server as part of the
process of resolving a name in challenge.state.ak.us, it will get an
apparently-spurious NXDOMAIN response.

I understand this isn't the case right now, but this is a problem
which might come and bite your behind if you later decide to change
the NS RRsets so that they are no longer equal for the two zones.

So the long and short of my advice: do the delegations properly by
copying the NS RRset from the child to the parent, plus any required
address glue records, and this particular problem will not become an
issue.

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Fully automated DNSSEC with BIND 9.16

2023-04-17 Thread Havard Eidnes via bind-users
> Our CentOS/RHEL 8 package are not just random BIND 9 snapshot.

Then please let me suggest that there is possibly an issue with
identification (customer said "9.16.23") and documentation of the
actual changes that are incorprorated in your distribution, compared
to the upstream-maintained patch releases published since that
release.  Sifting through those two lists and juding what's "needed"
and what isn't quite quickly becomes an unmanageable task.

Stability of the base version of BIND (perhaps in particular) should
not be mis-interpreted as an indication of continuing operational
safety.

Otherwise I have sympathy with Ondřey Surý's message.

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Fully automated DNSSEC with BIND 9.16

2023-04-18 Thread Havard Eidnes via bind-users
> You do not have to sift through lists.

That depends entirely what one wants to do.  I see a couple of
scenarios where that may be required:

1) Let's say someone has flagged to you as a BIND administrator that
   your BIND installatin is susceptible to CVE-2022-3924.  This
   could be done via an "external scan" and based on the BIND
   version returned (if your BIND is configured to reveal such
   details), or via other means.  How do you as an administrator
   figure out if the version you actually run has the fix for this
   CVE included?

   From the BIND change log, I can see

--- 9.16.37 released ---

6067.   [security]  Fix serve-stale crash when recursive clients soft quota
is reached. (CVE-2022-3924) [GL #3619]

   and if I run straight "upstream" code, it's fairly straight-
   forward to upgrade to this version, modulo, of course, the fact
   that this involves building it from source.

   On the other hand, looking at a version produced by a package
   maintainer (RedHat, Debian, ...), and where the package
   maintainer insists on sticking with whatever base version they
   started from (strictly based on timing, in all probability) and
   selectively applying patches, it will be much harder to figure
   out whether the fix is actually included.  And ... if the fix is
   indeed included, you'll as administrator in all probability have
   to mark the issue as "false positive" after having assured
   yourself that the fix is included.  However, getting to this
   assurance can be quite a bit of work.

2) You will end up with a somewhat similar scenario for
   non-security-related functionality fixes -- you may hit a
   problem which has been fixed upstream since your distributor
   forked off BIND, and you may be able to find the entry for the
   fix in BIND's upstream change log, but figuring out if that
   fix is indeed included in the code you run will make it
   necessary to rummage through the "patch list" of the
   package administrator.

> We provide quite detailed git branch with each change we
> make. It has references to bugs related too. I admit changes
> listed in release notes of bind9 releases are nicer. But we do
> not hide what and why we do changes, publish them quite nice
> way for c9s [1]. It would be the same c8s as well soon.
>
> For important changes they are mentioned in release notes of the minor
> release. But I admit we do not mention explicitly each bug we fix the
> way ISC does. It would make our documentation unreadable.
>
> In any case, even if we fall behind a couple of releases, any our
> packages of bind 9.16 are capable of automated DNSSEC deployment just
> fine. Sure, even we do not support it for RHEL7 or older.
>
> [1] https://gitlab.com/redhat/centos-stream/rpms/bind/-/commits/c9s

I certainly do appreciate that this is a considerable effort, and
that you do this as well as you can with all good intentions.  Now,
even though the change log is available as stated (which is good, of
course) does not necessarily make it easy to find.  And ... solving
the above two issues still requires a detailed sift through the
lists.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Fully automated DNSSEC with BIND 9.16

2023-04-19 Thread Havard Eidnes via bind-users
>>and if I run straight "upstream" code, it's fairly straight-
>>forward to upgrade to this version, modulo, of course, the fact
>>that this involves building it from source.
>
> It may not be necessary to build from source.  There are packages for
> some distros maintained by ISC
> (https://kb.isc.org/docs/isc-packages-for-bind-9).

I stand corrected, thanks for reminding me.  I come from the
non-Linux open source side, so needs this reminder from time to
time.

BTW, if someone from ISC is listening in, the above KB URL
currently returns

   The request is blocked.
   
04Mk/ZADbZIhApAs8So/u0PGqLpjUU1ZHMjBFREdFMDYyMgAxMTU1ZGM4Yy1kNzdiLTQ3YzQtOThjNS02NzBhNjQ3MGRhNzE=

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Is it possible to upgrade bind from 9.11 to 9.18 directly?

2023-04-21 Thread Havard Eidnes via bind-users
Hi,

a partial response:

> If it's possible, can anyone confirm zone transfers from master
> to slave would still work even if the servers ran different
> major versions?

Yes, "of course", because the details of that transfer is
specified by the DNS protocol standards.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Issue: Name huawei.com (SOA) not subdomain of zone cloud.huawei.com -- invalid response

2023-06-06 Thread Havard Eidnes via bind-users
> On 02/06/2023 13:59, Jesus Cea wrote:
>> On 2/6/23 10:38, Cathy Almond wrote:
>>> Has this just started - as in, it worked before ... when?
>>
>> No idea. We have been biten by this because a new client. The issue
>> could be for ages, no idea.> That may be so.  For the client, they're
>> getting a SERVFAIL from your resolver instead of 'there is no  RR
>> for oauth-login.cloud.huawei.com'.
>
> But they should be getting a query response for the A record for the
> same name, and then using that - assuming that they do actually query
> for the A record too?
>
> Is the client actually broken because of the broken provisioning of
> the servers for cloud.huawei.com, or is the issue just the plague of
> log messages you're seeing?
>
> (Aside: it is nevertheless a pity Huawei can't set up this delegation
> properly - it might just be an incompletely/improperly configured
> (maybe proxying?) set of load-balancers or something of that ilk).

It definately looks like a load-balancer of some sort which
doesn't sufficiently implement the DNS standards, and probably
has no concept of "zone", or even knows anything about other RR
types than "A".  Ref. the answers you get to

dig @ns3.dnsv5.com. oauth-login.cloud.huawei.com. a

(gives two IPv4 addresses) compared to

dig @ns3.dnsv5.com. oauth-login.cloud.huawei.com. 
dig @ns3.dnsv5.com. cloud.huawei.com. ns

Both of the two latter say "NOERROR", "answer-count=0" and refers
in the authority section to

;; AUTHORITY SECTION:
huawei.com. 180 IN  SOA ns3.dnsv5.com. 
enterprise3dnsadmin.dnspod.com. 1686041357 3600 180 1209600 180

However, asking one of the huawei.com name servers for the name
servers for cloud.huawei.com as e.g.

dig @nsall.huawei.com. cloud.huawei.com. ns

gives this result:

;; AUTHORITY SECTION:
cloud.huawei.com.   600 IN  NS  gns1.huaweicloud-dns.org.
cloud.huawei.com.   600 IN  NS  ns3.dnsv5.com.
cloud.huawei.com.   600 IN  NS  ns4.dnsv5.com.

So...  Neither of those three appear to even implement the
concept of "zone", and the observed behaviour ensues, as the SOA
when asked for  or NS records for that name results in an
upwards referral, and that now triggers a SERVFAIL, as that
doesn't progress the resolution of the name.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Issue: Name huawei.com (SOA) not subdomain of zone cloud.huawei.com -- invalid response

2023-07-10 Thread Havard Eidnes via bind-users
> You are wrong if you think the SOA record is only informal.
> It's not, see https://www.rfc-editor.org/rfc/rfc2308 for more
> details.

Exactly.  The SOA record included in the "Authority section" of an
NXDOMAIN ("name does not exist") or NODATA ("answer count" = 0,
i.e. indicating "name exists, but no record of this type exists")
indicates "under whose authority is this reply given", as indicated by
the owner name of the SOA record, and the version number of that zone
(as indicated by the version number in the SOA record).

Also, following up on an earlier part of this thread:

>>> It is at the core of delegation and trust model of DNS, now
>>> possibly enforced by DNSSEC.

Correct.  It's a matter of how you divide the name space into
zones, what a minimal zone looks like from an external observer,
and how delegations work.

A minimal zone will need to contain a SOA record for the zone,
and the NS RRset for the zone.  When a DNS name server which has
been delegated authority for a given zone, that name server had
better serve up the correct(!) SOA record with the correct owner
name when supplying an NXDOMAIN or a NODATA answer.

$ dig huawei.com. ns
...
;; ANSWER SECTION:
huawei.com. 2616IN  NS  nsall4th.huawei.cn.
huawei.com. 2616IN  NS  nsallsec.huawei.com.
huawei.com. 2616IN  NS  nsall.huawei.com.
huawei.com. 2616IN  NS  nsall3rd.huawei.cn.
...

Pick one, query:

$ dig @nsall.huawei.com. cloud.huawei.com. ns
...
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30727
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
...
;; AUTHORITY SECTION:
cloud.huawei.com.   600 IN  NS  ns4.dnsv5.com.
cloud.huawei.com.   600 IN  NS  ns3.dnsv5.com.
cloud.huawei.com.   600 IN  NS  gns1.huaweicloud-dns.org.
...

This means:

1) The zone cloud.huawei.com should exist
2) This entire zone is delegated to the named name servers (only
   authority over the DS record for the zone name remains with the
   parent NSes, if/when you do DNSSEC).
3) NXDOMAIN or NODATA responses from these name servers for names
   in cloud.huawei.com should include the SOA record for the
   cloud.huawei.com zone.
4) As stated above, both SOA and NS records for this zone should
   be returned by these name servers (they do not, see below).

Side issue: note that the "additional" count above in the last
reply is wrong (there is no additional record in the reply).

$ dig @ns4.dnsv5.com. cloud.huawei.com. ns
...
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15950
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
...
;; AUTHORITY SECTION:
huawei.com. 180 IN  SOA ns3.dnsv5.com. 
enterprise3dnsadmin.dnspod.com. 1688974445 3600 180 1209600 180
...

Again, "additional" count is wrong.  The owner name of the SOA
record is also wrong, since the reply from nsall.huawei.com above
states that cloud.huawei.com is a delegated zone.  It is
therefore wrong by this name server to refer back up the zone
tree to the parent zone's authority for a name which is clearly
within the delegated zone.

Also, it failed to respond with a copy of the NS RRset for the
zone; it should have included that set in the answer section when
asked explicitly about it.

$ dig @ns4.dnsv5.com. .cloud.huawei.com. a
...
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37427
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
...
;; AUTHORITY SECTION:
huawei.com. 180 IN  SOA ns3.dnsv5.com. 
enterprise3dnsadmin.dnspod.com. 1688974445 3600 180 1209600 180
...

OK, here we get (correctly) a "name does not exist" error, since
the name truly doesn't exist, but again the owner name for the
SOA record in the response is wrong, and refers to the parent
zone, not the zone where the name would exist if it did exist.
Upwards referral => SERVFAIL.  You get what you deserve for not
correctly implementing the delegation model and zone delination
rules.

$ dig @ns3.dnsv5.com. oauth-login.cloud.huawei.com. 
...
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 22050
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
...
;; AUTHORITY SECTION:
huawei.com. 180 IN  SOA ns3.dnsv5.com. 
enterprise3dnsadmin.dnspod.com. 1688974445 3600 180 1209600 180
...

Again, "Additional" count is wrong, and the SOA owner name is
wrong -- it should have been cloud.huawei.com, since the copy of
the NS RRset from the huawei.com zone indicates that
cloud.huawei.com should be a zone.


Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bin

Re: Issue: Name huawei.com (SOA) not subdomain of zone cloud.huawei.com -- invalid response

2023-07-10 Thread Havard Eidnes via bind-users
> I was curious about the additional section count dig is
> reporting.  I had to do a packet capture to prove it to myself,
> but there is an additional records section returned in the
> answer from 183.47.126.169.  It is the edns OPT pseudosection
> which is also shown in my dig output:

You appear to be correct, and I stand corrected on this side
issue.

It doesn't really change the major problem that the name servers
serving the cloud.huawei.com zone appear to have a deficient
implementation of the concept of a zone.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Observation: BIND 9.18 qname-minimization strict vs dig +trace

2024-04-26 Thread Havard Eidnes via bind-users
> The facts are:
>
>   * 191.131.in-addr.arpa is served from awsdns

Correct.  And it's delegated to from the 131.in-addr.arpa zone,
maintained by ARIN.

>   * It delegates 85.191.131.in-addr.arpa with fs838.click-network.com
> and ns102.click-network.com above the zone cut.

Correct.

>   * Below the zone cut the nameserver claims to be authoritative for its
> parent's zone (191.131.in-addr.arpa) instead of
> 85.191.131.in-addr.arpa. (In other words it's lame.)

Well, yes.  When queried for the NS set for 85.191.131.in-addr.arpa it
returns "NOERROR" with the 191.131.in-addr.arpa SOA record in the
authority section.  This is what is called an "upward referral", and
indicates that the delegation structure and/or child name server setup
is inconsistent with the delegation structure.  Were I less charitable
I would say "messed up".  Basically what you say above -- it doesn't
serve the delegated zone so is "lame".

>   * (Below the zone cut it also erroneously advertises one of its
> nameservers as simply ns102. instead of ns102.click-network.com)

Yep.

>   * There is no server which actually advertises itself as authoritative
> for 85.191.131.in-addr.arpa

Yep.  Both of the resolveable NSes ns102.click-network.com and
fs838.click-network.com claim authority over 191.131.in-addr.arpa,
which they don't have according to the parent zone DNS delegations.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
> Sorry if this has already been hashed through, but I cannot
> find anything in the archive.  Is there any chance someone can
> make dig and nslookup DNSSEC aware and force it to use DoT or
> DoH ports - TCP 443 or 853 only?

Not sure about that.  However, the "kdig" utility from the "knot"
name server is able to do DoT and DoH (the latter only if
configured to use libnghttp2), and in my case that was the
shorter path to the goal of having a CLI tool to do DoT and DoH
testing.

Regards,

- Håvard

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
>> Sorry if this has already been hashed through, but I cannot
>> find anything in the archive.  Is there any chance someone can
>> make dig and nslookup DNSSEC aware and force it to use DoT or
>> DoH ports - TCP 443 or 853 only?
>
> Not sure about that.  However, the "kdig" utility from the "knot"
> name server is able to do DoT and DoH (the latter only if
> configured to use libnghttp2), and in my case that was the
> shorter path to the goal of having a CLI tool to do DoT and DoH
> testing.

I should perhaps make it clear that this only answers half of the
question; "kdig" isn't any more "DNSSEC aware" than "dig".

And, no, I'm not aware of any such plans to incorporate a DNSSEC
validator in any of those tools.  Not sure it makes technical
sense, as it's a fairly large task.  That's what a validating
recursive resolver does; watch for the 'ad' flag from one such
instead?

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Counters for DNS transports?

2024-05-22 Thread Havard Eidnes via bind-users
Hi,

I recently had reason to enable BIND 9.18.27 to do DoT and DoH
(done via unbound earlier), and it all appears to work well so
far.

I have configured

statistics-channels {
inet 127.0.0.1 port 8053 allow { 127.0.0.1; };
inet  port 8053 allow { blah; };
};

The former for collection of monitoring data using collectd, the
latter for interactive inspection.

However, I was somewhat surprised that there does not appear to
exist any stats counter couting the number of queries received
per transport, to make it possible to monitor and distinguish
between "via UDP/53", "via TCP/53" and "via TLS" or "via HTTPS".
Is this a missing feature?

I've not checked, but does perhaps BIND 9.19.x have an
improvement over 9.18 in this aspect?

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Make dig and nslookup DNSSEC aware?

2024-05-22 Thread Havard Eidnes via bind-users
>   Doesn't dig already offer DoT using +tls and DoH using +https?

You're right, it does.

I need to sort out my $PATH...

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Counters for DNS transports?

2024-05-22 Thread Havard Eidnes via bind-users
> I frontend DoH and DoT traffic with nginx and use that for
> analytics/statistics.

Thanks, but I think that violates the KISS principle.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Counters for DNS transports?

2024-05-22 Thread Havard Eidnes via bind-users
> this has been planned, but unfortunately other stuff got into the way.
>
> It is still on our roadmap though.

OK, thanks, it's reassuring that I hadn't overlooked something
this time around, and it's good to see it's already thought about
and on your roadmap.  It's also on my wishlist, FWIW. :)

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Problem with a certain domain

2024-05-31 Thread Havard Eidnes via bind-users
> I use bind9 on my mail server so that Spamassassin can perform the
> necessary DNS blocklist queries. Since it has already happened several
> times that I have to restart bind9 so that a certain domain can still
> be resolved, I wanted to ask if anyone knows where I have to set
> something.
> 
> A mail user regularly receives a newsletter from Spain. But the query
> to check the DKIM signature sometimes leads to a communication error,
> timeout and a write error. I am then informed of these errors by
> e-mail so that I can restart bind9 promptly. Because then it works
> smoothly again until this problem occurs again at some point.
> 
> Domain of DKIM-request (duration when the problem occurs 4992 msec!)
> 
> dig s1._domainkey.mg-esp-prod-eu-eu.mallorcazeitung.es

My go-to DNS debugging site at

https://dnsviz.net/d/s1._domainkey.mg-esp-prod-eu-eu.mallorcazeitung.es/dnssec/

appears to indicte there is more than one problem, but the most
serious one is probably this one:

It might look like one or more of the publishing name servers responds
incorrectly when queried for an "empty non-terminal" name
(e.g. _domainkey...), which probably itself doesn't have any data on
that node, but has data on "names below".  The correct response code
is then NOERROR with answer count=0 (aka. "NODATA"), not NXDOMAIN.

When a recursor gets NXDOMAIN back, it is free to assume that the
queried-for name does not exist (which is obvious), and nothing exists
below that node either.  See RFC 8020.

Regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 9.18 horrendous

2024-08-24 Thread Havard Eidnes via bind-users
>> That being said. It's preposterous to complain about free software.
>
> https://biplane.com.au/blog/?p=375

Well said!

The original poster did not supply any information which might be
of assistance in characterizing what he observed.  He only said
"1300 zones", and showed a "top" display.  Nothing about the
query load, nothing about whether the name server also performed
recursive lookup service, and nothing about anything significant
in the environment has changed since the "good old days of older
versions" -- in other words, nothing which can be used to narrow
down the cause of his observation.

Instead we get anger where the user uses swearwords and implies
that ISC staff are stupid ("with stupidity like this"), which I
can assure you of is not true.

I run several BIND installations in my work, both a resolver
cluster and several publishing name servers, and routinely see
query loads in the 2000 qps range for the resolver nodes and our
publishing nodes see between 100 - 400 - 1000 qps with no
noticeable load to speak of, all with relatively recent BIND
9.18.x versions.  Yes, this is not particularly impressive
figures, which makes us a "small fish".  Perhaps the original
poster wanted to implicitly brag that he is a "big fish"?

So what that original poster was going on about I have absolutely
no idea, and there's precious little posted in his message which
is actionable.

As both recipient and originator of error reports of various
types in my work, I appreciate the details the BIND issue tracker
asks for when submitting actual bug reports, and I try my best to
submit decent error reports with sufficient details for
reproduction of any problem I report.

But it's evident that the original poster had no intention of
contributing to improving BIND.

The fact that many if not most of us get all this for free is
further reason to not just complain for the sake of complaining.

Best regards,

- Håvard
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND statistics

2024-08-25 Thread Havard Eidnes via bind-users
Hi,

I'm mostly running BIND 9.18.x, and have configured statistics
publishing via

statistics-channels {
inet 127.0.0.1 port 8053 allow { 127.0.0.1; };
inet "actual-address" port 8053 allow { prefix1/24; prefix2/24; };
};

I've started testing 9.20.x.

I see BIND 9.20.x stats publishing is ... different.

If I use firefox and visit http://actual-address:8053/ with BIND
9.18.x, I get a reasonably rendered HTML display which is easy to
view.

Not so for BIND 9.20.x; I get an XML document which firefox (in
this particular case version 120.0) informs me at the top

   This XML file does not appear to have any style information
   associated with it. The document tree is shown below.

and the document starts with









https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"/>