dnssec-lookaside != auto

2010-12-19 Thread Torinthiel
Hello everyone,

I've recently updated bind to version 9.7.2_p3.

I've been using DLV before that, specifically dlv.isc.org, with two
entries in named.conf

options {
dnssec-lookaside . trust-anchor dlv.isc.org.;
};
trusted-keys{
[sometext]
};

and it was working fine.
However, on update I've wanted to try managed-keys. so changed
trusted-keys to managed-keys (and added initial key of course)

so the relevant part of config file now looks like this:

managed-keys {
dlv.isc.org. initial-key 257 3 5
"BEPHMu/5onzrEE7z1egmhg/WPO0+juoZrW3euWEn4MxDCE1+lLy2
brhQv5rN32RKtMzX6Mj70jdzeND4XknW58dnJNPCxn8+jAGl2FZLK8t+
1uq4W+nnA3qO2+DL+k6BD4mewMLbIYFwe0PG73Te9fZ2kJb56dhgMde5
ymX4BI/oQ+cAK50/xvJv00Frf8kw6ucMTwFlgPe+jnGxPPEmHAte/URk
Y62ZfkLoBAADLHQ9IrS2tryAe7mbBZVcOwIeU/Rw/mRx/vwwMCTgNboM
QKtUdvNXDrYJDSHZws3xiRXF1Rf+al9UmZfSav/4NWLKjHzpT59k/VSt TDN0YUuWrBNh";
};


this has caused problem, every query caused error, no answers and these
log entries:

Dec 19 21:22:38 sarlac named[4137]: validating @0xb48c0030: dlv.isc.org
DNSKEY: must be secure failure,  . is under DLV (startfinddlvsep)
Dec 19 21:22:38 sarlac named[4137]: error (must-be-secure) resolving
'dlv.isc.org/DNSKEY/IN': 156.154.101.23#53

After some googling and finding
http://www.mail-archive.com/bind-users@lists.isc.org/msg06660.html
and even better
http://www.mail-archive.com/bind-users@lists.isc.org/msg05689.html

I've changed to dnssec-lookaside auto. Lo and behold, everything works fine.

However, this presents the following problems to me:
- managed keys does not work as advertised:
In bind manual (PDF downloaded from http://www.bind9.net/manuals), it's
said that managed-keys is similar to trusted-keys, but where key in
trusted-keys is static and trusted as long as it's in config file, key
in managed-keys is trusted only once, to download this key and store it
in trusted database. This proves to be wrong, as it's not trusted even
that one time.

- I don't seem to be able to switch to another DLV registry.
dnssec-lookaside accepts only auto, so I have no choice but to use
built-in DLV. But, e.g. secspider.cs.ucla.edu looks interesting.

Can anyone shed some light if this is my mistake, not having something
in configuration, or a general bind error?

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-lookaside != auto

2010-12-19 Thread Torinthiel
On 12/20/10 01:32, Mark Andrews wrote:
> In message <4d0e8340.9060...@data.pl>, Torinthiel writes:
>   
>> Hello everyone,
>>
>> I've recently updated bind to version 9.7.2_p3.
>> 
> Upgraded from what?
>   

>From 9.4.3_p5

>  
>   
>> I've been using DLV before that, specifically dlv.isc.org, with two
>> entries in named.conf
>>
>> options {
>> dnssec-lookaside . trust-anchor dlv.isc.org.;
>> };
>> trusted-keys{
>> [sometext]
>> };
>>
>> and it was working fine.
>> However, on update I've wanted to try managed-keys. so changed
>> trusted-keys to managed-keys (and added initial key of course)
>>
>> so the relevant part of config file now looks like this:
>>
>> managed-keys {
>> dlv.isc.org. initial-key 257 3 5
>> "BEPHMu/5onzrEE7z1egmhg/WPO0+juoZrW3euWEn4MxDCE1+lLy2
>> brhQv5rN32RKtMzX6Mj70jdzeND4XknW58dnJNPCxn8+jAGl2FZLK8t+
>> 1uq4W+nnA3qO2+DL+k6BD4mewMLbIYFwe0PG73Te9fZ2kJb56dhgMde5
>> ymX4BI/oQ+cAK50/xvJv00Frf8kw6ucMTwFlgPe+jnGxPPEmHAte/URk
>> Y62ZfkLoBAADLHQ9IrS2tryAe7mbBZVcOwIeU/Rw/mRx/vwwMCTgNboM
>> QKtUdvNXDrYJDSHZws3xiRXF1Rf+al9UmZfSav/4NWLKjHzpT59k/VSt TDN0YUuWrBNh";
>> };
>>
>>
>> this has caused problem, every query caused error, no answers and these
>> log entries:
>>
>> Dec 19 21:22:38 sarlac named[4137]: validating @0xb48c0030: dlv.isc.org
>> DNSKEY: must be secure failure,  . is under DLV (startfinddlvsep)
>> Dec 19 21:22:38 sarlac named[4137]: error (must-be-secure) resolving
>> 'dlv.isc.org/DNSKEY/IN': 156.154.101.23#53
>> 
> And what other errors were logged by named when it started?
>   
None. Complete startup log sequence:
Dec 20 07:49:14 sarlac named[4137]: loading configuration from
'/etc/bind/named.conf'
Dec 20 07:49:14 sarlac named[4137]: reading built-in trusted keys from
file '/etc/bind/bind.keys'
Dec 20 07:49:14 sarlac named[4137]: using default UDP/IPv4 port range:
[1024, 65535]
Dec 20 07:49:14 sarlac named[4137]: using default UDP/IPv6 port range:
[1024, 65535]
Dec 20 07:49:14 sarlac named[4137]: set up managed keys zone for view
_default, file 'managed-keys.bind'
Dec 20 07:49:14 sarlac named[4137]: reloading configuration succeeded
Dec 20 07:49:15 sarlac named[4137]: managed-keys-zone ./IN: loaded serial 16
Dec 20 07:49:15 sarlac named[4137]: zone torinthiel.pl/IN: loaded serial
2010110801
Dec 20 07:49:15 sarlac named[4137]: reloading zones succeeded
Dec 20 07:49:15 sarlac named[4137]: zone torinthiel.pl/IN: sending
notifies (serial 2010110801)



>  
>   
>> After some googling and finding
>> http://www.mail-archive.com/bind-users@lists.isc.org/msg06660.html
>> and even better
>> http://www.mail-archive.com/bind-users@lists.isc.org/msg05689.html
>>
>> I've changed to dnssec-lookaside auto. Lo and behold, everything works fine.
>> 
> And the contents of /etc/bind.key are?  Also the contents in the
> chroot area if you are using chroot.
>   
Changed /etc/bind.keys to /etc/bind/bind.keys, via config (and it reeds
it, you can see in logs). Contents were given in first post, only I
haven't mentioned it was in /etc/bind/bind.keys.
The managed-keys statement is the sole statement in /etc/bind/bind.keys
and is not present in main config file.
Ok, this was the problem. Having included the file as well as specified
it at bindkeys-file seems to have solved the problem. Ok, now the
documentation seems a bit unclear about it. It never states that the
file is included nor that it's not. But having information that it loads
the given file (in dnssec-lookaside description) and information that
file is loaded in logs has given me a false sense of security in this
case. Is this double-include (sort of) configuration what I was supposed
to do? Will it work correctly after a key rollover?

Also, another question arises: can one include more than one
bindkeys-file and/or dnssec-lookaside in config? The documentation hints
that at least the latter is possigble, but does not state so. And having
multiple bindkeys-file is useful if you have locally-configured keys,
for which using the main file is not recommended.

Skipping rest of answers, as problem is (mostly) solved.
Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Does anyone know where to find the ISC signing keys for source packages?

2010-12-28 Thread Torinthiel
Thomas Schulz pisze:
>> On 12/23/2010 4:09 PM, Casey Deccio wrote:
>> 
>>> On Thu, Dec 23, 2010 at 12:49 PM, Oisin McGuinness  
>>> wrote:
>>>
>>>   
>>>> But I can't find any reference to current PGP or other signing keys; does
>>>> anyone know where to find
>>>> them on the www.isc.org web site or where to obtain them otherwise?
>>>> 
>>> http://www.isc.org/about/openpgp
>>>   
>> https://www.isc.org/about/openpgp will work as well.
>>
>> -- 
>> Dave
>> 
>
> It looks like I am a little dim today. Given gpg and the key, what steps
> do I do to verify a source package?
>   

First, you get the tarball and the signature from isc.org (say
http://www.isc.org/software/bind/972-p3/download/bind-972-p3targz )
Second, you issue
gpg --verify bind-9.7.2-P3.tar.gz.asc bind-9.7.2-P3.tar.gz

might work with only the signed name (gpg --verify
bind-9.7.2-P3.tar.gz.asc),  I'm not sure how about this case.
Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-lookaside != auto

2010-12-28 Thread Torinthiel
Dnia 2010-12-28 09:26 Eivind Olsen napisał(a):


>> >> trying to resolve www.microsoft.com or microsoft.com results in a
>> >> "connection timed out; no servers could be reached"
>> 
> >
> >Well, for what it's worth - it's not just you having that issue. When
> >testing from home and from work I get the same.
> >
> >Of course, I could be doing something wrong, but whenever I see an error I
> >like to imagine it's somebody elses fault :D
> >
> >One of the nameservers for microsoft.com is ns1.msft.net with an IP
> >address of 65.55.37.62. For some reason the response I get from it is
> >truncated, and retrying using TCP doesn't work. Using EDNS0 also doesn't
> >seem to work, I get FORMERR back:
>   


[cut long listing of DNS tries]

Same here, I cannot reach this server with TCP or EDNS, nor get longer 
replies (al with dig), nor can bind resolve it locally (although it works 
with simple A query)
Confirmed, I can get TCP and EDNS replies from a.ns.se

Gentoo, bind version 9.7.2_p3, server located somewhere in France, in OVH 
network.



> >So, to recap: at the risk of showing what a fool I am by doing something
> >completely wrong here, I'm betting Microsoft has messed up their DNS - I
> >would have expected queries over TCP to work, and I would not have
> >expected EDNS to give a FORMERR (but ok, if a nameserver doesn't implement
> >EDNS, giving a FORMERR is apparantly the right thing to do).
>   

Not being a bind expert myself (but having read and hopefully understood the 
RFC's) I have to agree with it. And, having other issues with Microsoft DNS 
server myself (althoug this could be the lameness of it's admins as well), I 
don't have a hard time believing this.

Although, if it works when VM is duplicated but has no traffic, it looks 
like something else to me (maybe two completely different errors, but with 
similar apperance)

Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: auto update signatures dnssec

2010-12-28 Thread Torinthiel
fakessh @ pisze:
>>> zone "fakessh.eu" {
>>> type master;
>>> file "/var/named/fakessh.eu.hosts";
>>> auto-dnssec maintain;
>>> update-policy local;
>>> key-directory "/var/named/keyset-fakessh.eu";
>>> allow-transfer {  213.251.188.140;87.98.164.164;
>>> 195.234.42.1;94.23.59.30; };
>>> };
>>>
>>> is what the guidelines are good options
>>>   
> hello responsible bind community. 
>
> you gave me the answer, thank you to my question but I am having new
> problems. 
>
> I encounter errors during the self resignatures
>
> i quote my multiple error :
>
> I do not know what it is
>
>
>   
[cut most log entries]
> Dec 28 22:04:02 r13151
> named-sdb[24511]: /var/named/renelacroute.fr.hosts.jnl: create:
> permission denied
> Dec 28 22:04:02 r13151 named-sdb[24511]: dns_dnssec_findzonekeys2: error
> reading private key file fakessh.eu/DSA/9552: file not found
> Dec 28 22:04:02 r13151 named-sdb[24511]: dns_dnssec_findzonekeys2: error
> reading private key file fakessh.eu/DSA/47103: file not found
>   

First, where are the key files, related to bind directory (the one in
options { directory })?
Are the names correctly given to bind?
it looks like bind cannot find them.

Second, you need to give the user runing bind (probably named) rights to
write to /var/named/renelacroute.fr.hosts.jnl directory.
Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind 9.7.2-P3 does not resolve www.microsoft.com

2010-12-28 Thread Torinthiel
Ok, trying to send the same email third time, maybe it will get to the right 
recipient and with the right subject at last.
Damn webmail, damn trying to resend from thunderbird.


Dnia 2010-12-28 09:26 Eivind Olsen napisał(a):


>> >> trying to resolve www.microsoft.com or microsoft.com results in a
>> >> "connection timed out; no servers could be reached"
>> 
> >
> >Well, for what it's worth - it's not just you having that issue. When
> >testing from home and from work I get the same.
> >
> >Of course, I could be doing something wrong, but whenever I see an error I
> >like to imagine it's somebody elses fault :D
> >
> >One of the nameservers for microsoft.com is ns1.msft.net with an IP
> >address of 65.55.37.62. For some reason the response I get from it is
> >truncated, and retrying using TCP doesn't work. Using EDNS0 also doesn't
> >seem to work, I get FORMERR back:
>   


[cut long listing of DNS tries]

Same here, I cannot reach this server with TCP or EDNS, nor get longer 
replies (al with dig), nor can bind resolve it locally (although it works 
with simple A query)
Confirmed, I can get TCP and EDNS replies from a.ns.se

Gentoo, bind version 9.7.2_p3, server located somewhere in France, in OVH 
network.



> >So, to recap: at the risk of showing what a fool I am by doing something
> >completely wrong here, I'm betting Microsoft has messed up their DNS - I
> >would have expected queries over TCP to work, and I would not have
> >expected EDNS to give a FORMERR (but ok, if a nameserver doesn't implement
> >EDNS, giving a FORMERR is apparantly the right thing to do).
>   

Not being a bind expert myself (but having read and hopefully understood the 
RFC's) I have to agree with it. And, having other issues with Microsoft DNS 
server myself (althoug this could be the lameness of it's admins as well), I 
don't have a hard time believing this.

Although, if it works when VM is duplicated but has no traffic, it looks 
like something else to me (maybe two completely different errors, but with 
similar apperance)

Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind 9.7.2-P3 does not resolve www.microsoft.com

2010-12-29 Thread Torinthiel
Dnia 2010-12-29 13:55 T. Wunderlich napisał(a):

>Thanks a lot for all your suggestions. I haven't found a solution yet, but 
found something 
>which got my attention:
>
>Have a look at the TTL of the following CNAME entries.
>
>What happens when the lookup lasts longer than those 57 seconds? Maybe 
named will get 
>in trouble then?

Wow, a lookup that takes more than 57 seconds? Now that's a lng query, 
even on a busy server.
Anyway, if you happen to ask the server second time after 56 seconds, than 
that's more probable.
I guess it should work correctly nonetheless.

>
>AND what do the RFC say about those CNAME chains? CNAME points to a CNAME?

It's not incorrect, but discouraged.
See http://tools.ietf.org/html/rfc1034, last two paragraphs of section 3.6.2

Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: ignoring incorrect nameservers in authority section

2010-12-30 Thread Torinthiel
Dnia 2010-12-30 18:03 p...@mail.nsbeta.info napisał(a):

>Sunil Shetye writes: 
>
>> 
>> Case 2: Lame Server Reply 
>> 
>> ===
>> $ dig +norecurse @a.iana-servers.net. example.org.
>> ;; flags: qr ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0 
>> 
>> ;; QUESTION SECTION:
>> ;example.org.IN  A 
>> 
>> ;; ANSWER SECTION:
>> example.org. 172800  IN  A   192.0.32.10 
>> 
>> ;; AUTHORITY SECTION:
>> example.org. 172800  IN  NS  ns1.example.org.
>> example.org. 172800  IN  NS  ns2.example.org.
>> === 
>> 
>> This is a lame server reply. bind ignores this reply. bind will give a
>> server fail reply to the client. 
>> 
> 
>
>Would you please tell me why this is a lame server reply? why bind will 
>give a server fail reply to the client? Thanks again a lot. 

Because it's contrary to itself.
You've specified norecurse, which means that if nameserver believes it has 
authorative data it should return it, if it doesn't it should return a 
referral (and no answer beside it).

But the server returns answer (which means it believes it has authorative 
data), but in authority section is not listed in nameservers, which states 
it does not have authorative data.

To sum up:
Question: Does the server have authorative data?
Answer 1: Server returns data when asked without recursion ->; YES
Answer 2: Server is not listed in authority section ->; NO
Real answer: Lame server.

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: ignoring incorrect nameservers in authority section

2010-12-30 Thread Torinthiel
Dnia 2010-12-30 19:18 p...@mail.nsbeta.info napisał(a):


>Please see this dig: 
>
>$ dig +norec dev.game.yy.com @202.96.128.166 
>
>; <<>> DiG 9.4.2-P2 <<>> +norec dev.game.yy.com @202.96.128.166
>;; global options:  printcmd
>;; Got answer:
>;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 31949
>;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 
>
>;; QUESTION SECTION:
>;dev.game.yy.com.   IN  A 
>
>;; ANSWER SECTION:
>dev.game.yy.com.1800IN  A   202.104.186.179 
>
>;; Query time: 5 msec
>;; SERVER: 202.96.128.166#53(202.96.128.166)
>;; WHEN: Thu Dec 30 19:16:44 2010
>;; MSG SIZE  rcvd: 49 
>
>
>So, is 202.96.128.166 a lame server? 

There's something strange with this one.
You've specified +norec on command line, but the query was sent with 'rd' - 
'recursion desired' flag, as if you haven't given +norec. And with recursion 
giving answer is perfectly legal. If not for that flag, then yes, I'd 
consider it a lame response, although probably someone more knowledgeable 
than me should judge this.
Regards,
 Torinthiel 
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: ignoring incorrect nameservers in authority section

2010-12-30 Thread Torinthiel
Dnia 2010-12-30 11:45 Torinthiel napisał(a):

>Dnia 2010-12-30 18:03 p...@mail.nsbeta.info napisał(a):
>
>>Sunil Shetye writes: 
>>
>>> 
>>> Case 2: Lame Server Reply 
>>> 
>>> ===
>>> $ dig +norecurse @a.iana-servers.net. example.org.
>>> ;; flags: qr ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0 
>>> 
>>> ;; QUESTION SECTION:
>>> ;example.org.   IN  A 
>>> 
>>> ;; ANSWER SECTION:
>>> example.org.172800  IN  A   192.0.32.10 
>>> 
>>> ;; AUTHORITY SECTION:
>>> example.org.172800  IN  NS  ns1.example.org.
>>> example.org.172800  IN  NS  ns2.example.org.
>>> === 
>>> 
>>> This is a lame server reply. bind ignores this reply. bind will give a
>>> server fail reply to the client. 
>>> 
>> 
>>
>>Would you please tell me why this is a lame server reply? why bind will 
>>give a server fail reply to the client? Thanks again a lot. 
>
>Because it's contrary to itself.
>You've specified norecurse, which means that if nameserver believes it has 
>authorative data it should return it, if it doesn't it should return a 
>referral (and no answer beside it).
>
>But the server returns answer (which means it believes it has authorative 
>data), but in authority section is not listed in nameservers, which states 
>it does not have authorative data.
>
>To sum up:
>Question: Does the server have authorative data?
>Answer 1: Server returns data when asked without recursion ->; YES
>Answer 2: Server is not listed in authority section ->; NO
>Real answer: Lame server.

And I was wrong about that one.

There are two issues with that one. First, I get a different response from 
that command. different flags (no ra but aa instead), differend authority 
section.

It's much simplier to tell if it's a 'lame nameserver response' although it 
can't be judged by a single query.
Let's say that nameservers for .org domain (there are a lot of them), when 
asked for example.org give a.iana-servers.net and b.iana-servers.net (which 
is true, and by itself nothing special). 
Then lets assume (which is not true, but a good example) that 
a.iana-servers.net when asked for www.example.org gives something (doesn't 
matter if a true answer, or missing record, or anything), but with 'aa' flag 
not set. This, by itself, is still nothing special, no server is required to 
know everything.
But from those two answers you have a contradiction, and this contradiction 
is a real lane nameserver issue. .org servers delegate answers to 
a.iana-servers.net, and a.iana-servers.net fails to deliver authorative 
response. So the delegation is in fact incorrect.
Fortunately, a.iana-servers.net does not behave the way I've described here 
and does set 'aa' flag in it's response.

Hope this clears up the issue a bit, and reduces misinformation caused by my 
previous answer.

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind replication

2010-12-31 Thread Torinthiel
Dnia 2010-12-31 09:58 Nuno Paquete napisał(a):

>
>No dia 31 de Dez de 2010, às 08:18, "p...@mail.nsbeta.info" 
 escreveu:
>
>> Anand Buddhdev writes: 
>>> On 31/12/2010 05:33, p...@mail.nsbeta.info wrote: 
>>>> Hi,
>>>> Is it a right way to run rsync for bind's zone files replication?
>>>> If we have dozons of zones, each zone has more than one view, under 
this
>>>> case setup the master/slave with standard zone-traff is the hard way 
IMO.
>>>> Thanks.
>>> Yes, that's just fine. You don't have to use zone transfers. 
>> 
>> Thanks. But I have another question,
>> how would bind know the zone files were changed before it reload zones? 
>> Regards.
>
>I think you have to restart bind. That's why I believe it's better to use 
zone transfers because it's automatic.

No, you don't have to.

If you know which zone has changed, than you can do "rndc reload zonename".
If you don't, than "rndc reload" reloads all zones.
You could also try "rndc reconfig", but I think it will only load new zonesm 
the ones just added in configuration, not never wersions of old zones).

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Entired NS crashed

2011-01-02 Thread Torinthiel
Michelle Konzack pisze:
> As far as I can see, 'dig +dnssec www.tamay-dogan.net' give a nice output
> but how can I know, the expiration date?
>
> Is this the timestamp here:
>
> tamay-dogan.net.3600IN  RRSIG   SOA 5 2 3600 20110131191903
>   
Nope

> [ command 'dig +dnssec tamay-dogan.net' ]---
> tamay-dogan.net.3600IN  SOA dns1.tamay-dogan.net. 
> hostmaster.tamay-dogan.net. 1292829280 10800 3600 604800 86400
> tamay-dogan.net.3600IN  RRSIG   SOA 5 2 3600 20110131191903 
> 20110101191903 12795 tamay-dogan.net. 
> lti7l2JlLeIATApQfWp3BdPTH4MiP75crl4921bC1qdOXfWJH4La+L58 
> t0hVMmzNaNbLDH36cQwrYdQvaBJHPkQEwi2Mr8WP0jCSp+bpc2lEP6sz 
> f+kRGWYITjuxAwFsSdhVR+EQd4pIupa16ylJ65OWcBGlIHbC5eA5KSN4 lTk=
>   
The RRSIG here has two numbers 20110131191903 20110101191903. Look at it
carefully: 2011-01-31 19:19:03
Looks like a date? The first one is when this signature ends to be
valid, the second when it starts, both in UTC time. So in this case your
signature on the SOA record is valid almost all of January.
There's nothing stopping you from having different vaility periods on
different signatures, it's all per-signature.
> tamay-dogan.net.86400   IN  NSECadmin.tamay-dogan.net. NS SOA 
> MX TXT RRSIG NSEC DNSKEY
> tamay-dogan.net.86400   IN  RRSIG   NSEC 5 2 86400 20110131191903 
> 20110101191903 12795 tamay-dogan.net. 
> YS5Y44ywYrsjbSJmtFgF9hk8K80VWLuyLRuDxLeO84kXA/hN9i8mzzDy 
> XYIoiUwWbyeKxEIhqAdA6gekLU2Z+ZuNsSGnPUcCdfZD+GiWEneeWGg/ 
> LcIi9FWTf7J++yGnVMA5Ng6vZ3SgTtiC7r74ZZytm7FkijxCwd8tRyKy a9c=
> 
>
> which I could grep?  And what is NSEC entry?
> Why is the VHost  there?
>   
And the NSEC is used in authenticated denial of existence. It tells that
there are NS, SOA etc recors with name tamay-dogan.net, and that next
name with any content is admin.tamay-dogan.net.
So, if eg you've asked for abyss.tamay-dogan.net the NS could present
you with this RR and it's signature and prove that abyss.tamay-dogan.net
(which falls between tamay-dogan.net and admin.tamay-dogan.net) does not
exist.
As a side effect, it's now possible to enumerate every record your zone.
If you're concerned about this, consider switching to NSEC3, which makes
it much harder.

Regards,
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: NSEC3 ISSUE

2011-01-08 Thread Torinthiel
On 01/07/11 14:25, rams wrote:
> I have trouble resolving the host name dnssecnsec3qatestdomain.com
> <http://dnssecnsec3qatestdomain.com>. which is NSEC3 signed.


> This is the
> parent and child zone. If I run dig ( dnssec query) with the +cd option
> I which is a proper response:

What version of bind are you using? My wild guess is that it's not
recent enough to recognize NSEC3 signatures. Bind 9.4.3 was not, and I
got exactly the same symptoms.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind 9 multiple masters setup

2011-01-12 Thread Torinthiel
On 01/12/11 16:13, dev null wrote:
> Hello,
> 
> I have most of this worked out but I intend to setup bind in a
> multiple master manner.
> 
> This makes me question a few things:
> 
> 1. What can I use for the SOA MNAME? In the off chance a box may die,
> I am thinking of using a VIP which contains the multiple masters
> within it. However I am not sure how this would affect NOTIFY. So can
> I use a VIP or do I just use one of the master DNS boxes in the SOA
> MNAME field?

It's mostly ignored. All resolvers go for the NS records at the zone
apex, not for MNAME. Even if the server named in MNAME dies, it won't
affect resolving. You just rebuild that machine, or even build another
one and change slaves to get data from new master.


> 2. With that said, I intend to use rndc to push out DNS changes,
> should I worry about using a VIP still? I may need to use both and
> NOTIFY seems like it is more built-in so I want to keep rndc and
> NOTIFY going.

Isn't it simplier to just let BIND do it's job? When master loads a
changed zone, it sends NOTIFY messages to slaves, and slaves seeing that
they have outdated zone files download the zone from master.
rndc can only tell BIND (either master or slave) to initiate that
connection, it can't change zones by itself.
You could of course copy zone files to slaves by some means (rsync?
scp?) and then rndc reload the slave, but
a) why?
b) it really isn't a slave anymore, at least not in DNS terms.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC's sorted zone

2011-01-12 Thread Torinthiel
On 01/12/11 17:58, Mark Elkins wrote:
> Still playing with DNSSEC and signing zones.
> 
> I'm resigning an already signed zone.
> 
> I'm doing this on a hyper-threaded 4-core i7 (Intel(R) Core(TM) i7 CPU
> 920 @ 2.67GHz) which under linux gives me 8 cores.
> 
> I'm using the command:
> 
> dnssec-signzone  -3 "abcd" -o example.com -p -t -A -d keyset -g -a -N
> increment -s 2011061553 -e 20110210161553 -f example.com.sign-1
> example.com.signed
> 
> A minute later - I run the same command - but output to a different
> file...   -f example.com.sign-2
> 
> A 'diff' of the two output files gives lots of differences - apart from
> the zone creation time.
> 
> If I include the "-n ncpus" as "-n 1" - then the files are the same
> (except for the creation time).
> 
> I believe that the data is fundamentally the same - but it is partially
> re-ordered if there are multiple threads. This is not what I would have
> expected - having had it been drummed into me that dnssec-signzone will
> first sort the zone then generate all the RRSIG records - etc...
> I find this disturbing. It appears to only be doing this on CNAME
> records.
> 
> In one file:
> www.access.example.com  CNAME  www.entry.example.com
> access.example.com  CNAME  entry.example.com
> 
> In the next - their order is swapped.
> 
> 
> Are these differences in ordering completely ignored when BIND loads the
> file into memory?

Yes, order is completely ignored. Not only by BIND, but by ANY decent
server. Try digg'ing any zone with numerous records for an answer, and
you will get them in random order every time. It's supposed to be that
way, that's how DNS works.
If order is the only difference in those files, ignore it.

More differences would be if you'd have omitted -s and -e, as it would
put current time in the RRSIG, and as RRSIG's signature includes
validity dates as well, than signature would be totally different.
Also I haven't used -p, maybe it causes both zones to have same random
data and thus same signatures.

Besides, dnssec-signzone doesn't have to sort the zone at once.
It only has to sort zone for generating NSEC records.
All RRSIGs can be generated without sorting. Of course RRSIGs on NSEC
need NSEC, so indirectly need sorting too.
For NSEC3 (which you are using) sorting makes no sense. Signing only
needs to sort hashed names to generate NSEC3 records. No need to sort
actual records in zone.
Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC Keys - and trying to not leaving them around

2011-01-12 Thread Torinthiel
On 01/12/11 16:07, Mark Elkins wrote:
>---
> 
> So now I want to resign the zone. Its already signed. How can I do that
> without having to have the Private KSK still around. I'd have thought
> that I'd just perhaps need the Private ZSK around to re-sign new zone
> data.
> 
> (here I removed the KSK Private file - 9983)
> I think this works - but I get the message:
> dnssec-signzone: warning: dns_dnssec_keylistfromrdataset: error reading
> private key file example.com/NSEC3RSASHA1/9983: file not found
> 
> So why is dnssec-signzone worried about the private part of a KSK that
> it (I believe) should not need? Bug?

Because it tries to resign whole zone, with new validity period. That's
why it needs KSK. You could try passing it the previously-signed
message, and add -i parameter.
However, see below why this is not necessary a good idea.


> 
>
> 
> My zone changes quite a bit - so what I was thinking to do is Sign a
> very basic copy of the zone (SOA, NS records - not much else) - then
> move the Private KSK's off the disk completely - then add in my
> "dynamic" data and re-sign as often as I need (whenever my "dynamic"
> data changes) with just my Private ZSK available.

KSK is only used to sign DNSKEY records. SOA, NS and everything else are
signed by ZSK.

> After about 6 month (whatever) - I can then create a new KSK - bring
> back my original 'off-disk' Private KSK - sign a new basic copy of my
> zone - take the two Private KSK's offline and go through the whole KSK
> roll-over process. ie - I only have the private part of the KSK on the
> disk for a very short time - usually its off-site. I should be able to
> generate my very basic zone on a completely different server - perhaps
> not connected to the Internet at all - and just (via USB stick) copy
> over the basic signed zone every six months?

You definitely can generate signatures offline. That's what's done for
the root zone.
But watch for one thing. You don't need to change KSK every time you
re-sign your zone. Changing the KSK requires some good timing, changing
the DS records in parent zone (if you publish them, and good odds that
you don't control the parent zone, only have some web/email/phone
interface to change your record) and informing all DLV repositories you
might be in and everyone that has configured your key as a trust anchor.
That's not something you want to do often.
What you also don't want, is long signature periods. Why? Because for as
long as a signature is valid, an attacker can pretend to anyone in the
Internet that your zone hasn't changed. E.g. you move your web server
from 1.2.3.4 to 4.3.2.1, update zone files, test that it works. But an
attacker has your older A and RRSIG records, and can present them to
someone in place of your correct answers. The receiver sees this
response, verifies RRSIG (it validates, after all you've created it) and
believes you still have 1.2.3.4 address.
Now, thin about what happens if the DNSKEY record gets attacked this
way, and you've changed it because your ZSK got stolen. As long as
signature is valid you're vulnerable.
Better, generate a range of signatures for DNSKEY with your KSK, say one
for each month' and keep those RRSIGs secret for now. Guard them the
same way you guard ZSK, but in different place, and release them into
the zone file only when needed. That way if ZSK gets compromised you
just scrap those signatures, generate new ZSK and new signatures.
Just don't put those signatures with ZSK. It it gets compromised so do
the signatures, and you're screwed.
Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: how to proper include DS record on key dnssec

2011-01-14 Thread Torinthiel
Dnia 2011-01-14 03:11 fakessh @ napisał(a):

>hello bind network  and hello dnssec network admin.
>
>
>thank you for answered, 
>I think I found a solution to my problem. 
>$INCLUDE directive is that I have to handle
>
>
>example: 
>   $INCLUDE /var/named/keys/dsset-fakessh.eu. fakessh.eu

YOU don't do it. This goes into the PARENT zone. Unless you manage the 
parent zone as well, but even in that case it goes into a different file.


>$INCLUDE /var/named/keys/keyset-fakessh.eu. fakessh.eu

This is OK, although when you have an $INCLUDE and do dnssiec-signzone it 
automatically resolves it, so generated signed zone does not habe $INCLUDE

>and perform a complete resignatures area zone
>this should enable me to have the flag DS and DS sign, DLV and DLV sign

Err, both the DS (as stated before) and DLV go into different zones.
To sum up:
DNSKEY goes to fakessh.eu
DS goes to .eu, and I don't have any idea if registrars already permit it
DLV goes to dlv.isc.net or any other dlv repository you want.

That's three different zones, and three different signers.


>in my area zone
>
>its right
>
>thanks for your return many return are welcome
>
>
>Le jeudi 13 janvier 2011 à 12:36 -0500, Paul Wouters a écrit :
>> On Thu, 13 Jan 2011, fakessh @ wrote:
>> 
>> > I correctly configure my server centos dnssec on with as a
>> > representative of encryptions dlv isc. my question is relevant and was
>> > already asked but I have not found the complete answer on google. my
>> > question is how to include the DS record in the Keys. my keys are in a
>> > separate folder. the DS record is already generated in
>> 
>> The DS record goes into the parent zone, not the zone itself.
>> 
>> > I also wonder the utility of this good record given that my signatures
>> > are marked as good on dlv
>> 
>> Use any public DNS server with dlv configured. eg nssec.xelerance.net:
>> 
>> dig +dnssec -t ds yourzone @nssec.xelerance.net
>> 
>> > what file in the include directive must be accomplished and realize how
>> > well inclusion of the DS record (what should be the proper syntax on 
how
>> > to declare dlv isc) how to re-sign after the keys
>> 
>> You give your DS via http://dlv.isc.org/
>> 
>> Paul

>-- 
>gpg --keyserver pgp.mit.edu --recv-key 092164A7
>http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x092164A7
>

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: AW: AW: Dns doctoring/dnsmasq -V on bind?

2011-01-17 Thread Torinthiel
Dnia 2011-01-17 15:53 someone napisał(a):

>If it *is* the only way...
>It will result in a tough week...
>Not what I wanted to hear indeed ;)

Maybe having a zone file for external view, and sed'ing the IPs to get file 
for internal view would get you an easier to maintain solution? You still 
have to setup views, but then it will be easier when you change something.
Torinthiel


>
>Ty.
>
>
>-Ursprüngliche Nachricht-
>Von: Phil Mayers [mailto:p.may...@imperial.ac.uk] 
>Gesendet: Montag, 17. Januar 2011 15:46
>An: someone
>Cc: bind-users@lists.isc.org
>Betreff: Re: AW: Dns doctoring/dnsmasq -V on bind?
>
>On 17/01/11 14:30, someone wrote:
>>
>> Running internal stuff over nat and the firewall is bad practice and 
>> should be avoided as it uselessly loads the firewall, increases the 
>> complexity of the rules and creates bottlenecks on a fast network
>backbone.
>
>Ah, I see. I misunderstood what you were trying to do. I thought the things
>you wanted to "doctor" were external IPs.
>
>> So again the question is: is there a way to do dns doctoring with bind
>only?
>
>I think currently the only solution for bind is to use views and separate
>copies of the zones with internal/external IPs.
>
>Not what you want to hear I'm sure.
>
>___
>bind-users mailing list
>bind-users@lists.isc.org
>https://lists.isc.org/mailman/listinfo/bind-users
>

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: get a domain's dns records

2011-01-21 Thread Torinthiel
Dnia 2011-01-21 08:50 Barry Margolin napisał(a):

>In article ,
> Joseph S D Yao  wrote:
>
>> On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:
>> > 
>> > I'm jsut curious, how does "who.is" know the dns records in my domain 
>> > (nsbeta.info)? 
>> > 
>> > The page shows some of my RRs exactly: 
>> > 
>> > http://who.is/dns/nsbeta.info/ 
>> 
>> 
>> The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
>> Who.is - Who.is".  They probably did just exactly that - DNS lookup.
>> Anything in DNS is public information.
>
>But the nameservers for the domain don't allow public zone transfers.  
>So if you know the names in the zone you can look them up, but how did 
>the site list the names in his zone?


My guess would be that they don't list the whole zone. Look what's there:
nsbeta.info (dig any nsbeta.info) and some quite easy to guess prefixes: 
mail, test and www. And everything deduced from them, like names 
test.nsbeta.info and mail.nsbeta.info resolve to.
Probably all questions asked with ANY recordtype
I've tested on two other domains, and it looks like that - results show that 
common prefixes also include blog. And they have some filtering of results, 
as I have a * TXT record which didn't show up as blog entry. Actually dig 
any on my zone gives even more information - e.g. SPF record , which didn't 
show up on results. And they don't support third-level domains as well - 
asking form mail.nsbeta.info returns information about nsbeta.info
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Forward using CNAME record

2011-01-25 Thread Torinthiel
Dnia 2011-01-25 10:18 Henry Hartley napisał(a):

>My apologies if this gets to the list twice. I tried to post it through 
>the web interface but it seems to have been dropped by whatever 
>screening gets applied.
>
>I'm not sure if I've misunderstood the use of CNAME or if I've simply 
>done something wrong.
>
>I have two domains that I want to forward. One is working properly and 
>the other is not. In both cases I want users to enter a URL in their 
>browser (www.example.com) and be forwarded to a different system, where 
>the user has their site. In the working case, the forwarding it to 
>web.me.com so I have the following in my zone file:
>
>www.example.com.   CNAME   web.me.com.
>
>When you point your browser to www.example.com (obviously not
>"example") the page on web.me.com loads properly but www.example.com is 
>still displayed in the address bar.
>
>In the second case, which is NOT working, I have a similar CNAME record 
>but instead of web.me.com, it's on tumblr.com. So, I have this (this is 
>the actual domain):
>
>www.ioanamorosan.com.  CNAME   ioanamorosan.tumblr.com.
>
>If you go directly to ioanamorosan.tumblr.com, the site loads, but if 
>you go to www.ioanamorosan.com, you get a tumblr.com 404 error page. The 
>browser still displays www.ioanamorosan.com in the address bar.
>
>So, is this a situation where web.me.com is set up to recognize 
>www.example.com properly but tumblr.com is not? Or what?
>
>Should I be able to do what I'm trying to do?

No, not exactly. your name properly resolves to the same domain as 
ioanamorosan.tumblr.com. Your DNS setup is perfectly correct. But the web 
server is not configured to handle www.ioanamorosan.com.
If you go to ioanamorosan.tumblr.com it handles the name correctly and gives 
your page. But when faced with a name it doesn't recognize it falls back to 
default site.

If you have a web panel to configure your hosting, look for something named 
alternative domain names, aliases, virtual hosts or virtual servers.

The name that is sent to the web serwer is the one typed in browser, and has 
nothing to do with any CNAME records on the way. The web server must be  
configured to handle it.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Globally setting TTL

2011-01-26 Thread Torinthiel
Dnia 2011-01-26 00:21 Eivind Olsen napisał(a):

>> Is it possible to globally set (override) the default TTL for all zones
>> and their subsequent records?
>
>You're thinking about the authoritative zones you host? I am not aware of
>any such setting, but it might be possible to use $INCLUDE in the
>zonefiles and include a file which contains "$TTL 86400" or whatever. Try
>it and see if that works for you :D

You can still type $TTL 86400 in your zone file, which will have the same 
effect. (although might be harder to change for more zones). But still this 
is ony the default, if an entry contains it's own TTL it will take 
precedence.
Other than sed'ing/awk'ing the zone files I see no other options.

Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Recursive DNS problem

2011-01-27 Thread Torinthiel
Dnia 2011-01-27 17:38 bangla desh napisał(a):
>
>Hello all,
>
>I am running Bind 9.7.1-p2 as recursive dns. I encountered this problem 
with
>the domain hsbc.com.bd. When I dig hsbc.com.bd, it gives me a connection
>timed out response.
>

[cut]
>
>I digged further about the problem as to what causes it. I found out that 
if
>I clear the cache and then dig first the ns record(s) of com.bd, before I
>dig hsbc.com.bd, I will be able to replicate the problem.

can't reproduce it here, works for me when I try stright hsbc.com.bd, or dig 
ns com.bd beforehand, or dig both ns bd and com.bd.
>
>What bothered me is what is in com.bd that blocks the response from
>hsbc.com.bd? Please I need your inputs.

One thing for sure. It has only one nameserver. This is plainly wrong, each 
domain should have at least 2 (and SLD like this one even more).
does it work when you type 
dig ns hsbc.com.bd @ns.com.bd
because that's what fails for me.

And there's more:

$  dig ns com.bd @dns.bd

; <<>> DiG 9.7.1 <<>> ns com.bd @dns.bd
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 57519
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;com.bd.    IN  NS

;; ANSWER SECTION:
com.bd. 86400   IN  NS  ns.com.bd.

;; ADDITIONAL SECTION:
ns.com.bd.  86400   IN  A   203.112.194.18

;; Query time: 368 msec
;; SERVER: 209.58.24.3#53(209.58.24.3)
;; WHEN: Thu Jan 27 11:00:46 2011
;; MSG SIZE  rcvd: 57

$  dig ns hsbc.com.bd @dns.bd

; <<>> DiG 9.7.1 <<>> ns hsbc.com.bd @dns.bd
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2379
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;hsbc.com.bd.   IN  NS

;; AUTHORITY SECTION:
hsbc.com.bd.    86400   IN  NS  ns11.hsbc.com.hk.
hsbc.com.bd.    86400   IN  NS  ns13.hsbc.com.hk.
hsbc.com.bd.    86400   IN  NS  ns1.hsbc.com.sg.

;; Query time: 368 msec
;; SERVER: 209.58.24.3#53(209.58.24.3)
;; WHEN: Thu Jan 27 11:01:07 2011
;; MSG SIZE  rcvd: 107

Which means that DNS server for .bd domain (at leas one of them) returns 
answer for ns for .com.bd (ok, it is a delegation probably), but also a 
(non-authorative) answer for hsbc.com.bd. This is a bit strange, it doesn't 
provide recursive queries, it has delegation for com.bd, but it's still 
willing to return deeper answers.
Now, what happens when you have clear cache is that it asks dns.bd for 
reference and gets hsbc records. But if you have NS com.bd in your cache, 
bind probably assumes (and quite correclty) that it shoud ask com.bd 
nameservers, not the bd. ones. But com.bd ones don't provide an answer, so 
you have timeout.
Looks like the com.bd zone is broken somewhat. either the delegation should 
be removed from bd, or the server needs fixing and adding another servers is 
necessary.
Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Recursive DNS problem

2011-01-28 Thread Torinthiel
Dnia 2011-01-28 10:52 bangla desh napisał(a):


>> I believed so that com.bd is broken. It only has 1 ns server and
>hsbc.com.bd, whois.com.bd and even google.com.bd they are all delegate
>directly from bd and not from com.bd.
>
>I am wondering, is there a dns rule/standard (or RFC) that explains about
>delegation?

For the fact that com.bd is broken - that's just how DNS works. Zone cuts 
are there for purpose. Most of this can be read from RFC 1034 and 1035, 
which form the grounds for DNS standards. Also RFC 2181 clarifies:

A server for a zone should not return authoritative answers for queries 
related to
   names in another zone, which includes the NS, and perhaps A, records
   at a zone cut, unless it also happens to be a server for the other
   zone.

And a mere presence of NS records indicates a zone cut (again, RFC 2181):

The existence of a zone cut is indicated in the parent zone by the
   existence of NS records specifying the origin of the child zone.


As for number of authorative servers per domain, I don't remember where, but 
at leas one RFC stated that there should be at least two, and preferably 3-7 
nameservers per domain. It's quite possible that one of those I've already 
pointed to contains this information, but also that a different one states 
this information. But it was RFC for certain.
Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
I have three questions regarding dnssec-signzone:

To clarify things, I'm using BIND 9.7.2-P2.

First is about input file: you can specify on the command line either the 
signed version of the zone, or the unsigned one.
What I'd like to do hovever, is to use both.
The unsigned zone is much more readable, and can contain $INCLUDE directives,
 which makes modification easier.
But specifying the signed zone has added benefit of reusing existing 
signatures, thus saving on computation time (not that I have a lot to save 
on ;). So, I'd like dnssec-signzone to take 'normal' records from non-signed 
zone, try to reuse RRSIG records as much as possible, taking them from 
signed zone, and write the result.
Is this possible with dnssec-signzone? Other than writing a custom tool to 
filter only NSEC/RRSIG records from .signed and appending this file to 
unsigned zone?
Which might not be that hard, probably a simple sed script would do.

Another is about key management and -S option:
Guessing by what I've read in the man page -S should use key metadata to 
decide when to include/exclude/use/revoke the key.
However, I've been unable to make it work. I have 2 KSK keys, one of them 
set to revoke in the past, as dnssec-settime kindly tells me.
But, when I do dnssec-signzone -S on the unsigned file, I get error message:
dnssec-signzone: fatal: cannot find DNSKEY RRSIGs
and nothing is signed.
dnssec-signzone without -S can properly sign the zone, ignoring revokation 
time.
Then, I do dnssec-signzone -S on the signed file, which only retains old 
signatures, also happily ignoring revokation time.
What am I doing wrong, why it fails to behave as I'd expect?


Third is about -N option:
a well established practice (although I don't know what was the origin) is 
to set SOA serial number to eg 2011020101, which is current day and 
two-digit of daily version. This has benefit of being almost as good as 
putting unixtime of last modification, while being much more human-readable. 
How difficult would it be to implement this for  dnssec-signzone -N, using a 
fourth format specifier?

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
On 02/01/11 19:44, Paul Wouters wrote:
> On Tue, 1 Feb 2011, Torinthiel wrote:
>
>>
>> To clarify things, I'm using BIND 9.7.2-P2.
>>
>> First is about input file: you can specify on the command line either
>> the
>> signed version of the zone, or the unsigned one.
>> What I'd like to do hovever, is to use both.
>> The unsigned zone is much more readable, and can contain $INCLUDE
>> directives,
>> which makes modification easier.
>> But specifying the signed zone has added benefit of reusing existing
>> signatures, thus saving on computation time (not that I have a lot to
>> save
>> on ;). So, I'd like dnssec-signzone to take 'normal' records from
>> non-signed
>> zone, try to reuse RRSIG records as much as possible, taking them from
>> signed zone, and write the result.
>
> see ldns-read-zone -d (data without sigs) and ldns-read-zone -s (sigs
> only)
> combined with -n (dont print soa) for one of them.

Thanks, nice tool. I'd have to look at ldns-* as I've only used drill
from ldns packages.

>
> Basically run the signed zone through ldns-read-zone -s, concatenate it
> with your unsigned zone, and run it through dnssec-signzone.
Or have a script that either strips the data from signed zone or creates
an empty file and then $INCLUDE that file in original unsigned zone.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Some dnssec-signzone questions

2011-02-01 Thread Torinthiel
On 02/01/11 22:13, Jay Ford wrote:
> On Tue, 1 Feb 2011, Torinthiel wrote:
>> Third is about -N option:
>> a well established practice (although I don't know what was the
>> origin) is
>> to set SOA serial number to eg 2011020101, which is current day and
>> two-digit of daily version. This has benefit of being almost as good as
>> putting unixtime of last modification, while being much more
>> human-readable.
>> How difficult would it be to implement this for  dnssec-signzone -N,
>> using a
>> fourth format specifier?
>
> It's not hard.  See my bind-users post of Oct 15 with subject:
>more flexible serial number handling in dnssec-signzone
>
> Since then I've quit using the serial number fiddling ability of
> dnssec-signzone.  The problem is that it doesn't increment the serial
> number
> in the unsigned file, so future uses of "dnssec-signzone -N" could result
> with the same or even lower values.
Yes, that's a problem. Combined with ldns-read-zone and answer to my
first question this could make dnssec-signzone read the good SOA record.
I was also thinking of simply changing it by sed in a script.


>
> Instead, I created a zap-serial tool to zap the serial number in place
> within
> the unsigned zone file, either to a new literal value or incrementing
> the old
> number.  My DNSSEC-related processes now zap the serial number before
> signing
> with dnssec-signzone.  You can find the C source for zap-serial & some
> possibly useful other DNSSEC-related scripts here (at least for now):
>http://seatpost.its.uiowa.edu/bind_stuff
Nice set of scripts. I was thinking of writing my own with probably
similar functionality, but I'll start with those. Main difference is
that I don't store keys online, so I'd like the scripts to notify me
that signing is necessary instead of signing.
 Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Delegation question

2011-02-04 Thread Torinthiel
Dnia 2011-02-04 23:16 Jean-Yves Avenard napisał(a):

>Hi
>
>On 4 February 2011 22:54, Eivind Olsen  wrote:
>
>> Unless I'm misunderstanding something, it should work. Here's an extract
>> from the BIND 9.7 ARM, section 6.2.16.2:
>>
>> "Forwarding occurs only on those queries for which the server is not
>> authoritative and does not have the answer in its cache."
>>
>> How exactly had you configured forwarding in your named.conf file?
>
>I use bind that comes with mac os 10.6 server (9.6.0-APPLE-P2);
>
>named.conf at the beginning includes a file options.conf.apple like so:
>options  {
>include "/etc/dns/options.conf.apple";
>};
>
>options.conf.apple contains:
>directory "/var/named";
>
>forwarders { 203.59.24.3; 203.0.178.191; 203.134.24.70; };
>
>allow-transfer { none; };
>
>in named.conf I then have:
>include "/etc/dns/privateView.conf";
>
>which contains:
>view "intranet_view" {
>
>match-clients { 127.0.0.0/8; 192.168.0.0/23; };
>
>   allow-recursion { "internal"; };
>
>zone "." {
>type hint;
>   file "named.ca";
>};
>
>zone "domain.com" {
>type master;
>   file "internal/db.domain.com";
>   check-names ignore;
>notify TRUE;
>   allow-update { key "rndc-key"; };
>// Cancel the forwarding for this authoritative domain.
>forwarders {
>};
>};
>
>On the other hand ; is the server authoritative for the sub-domain
>mel.domain.com provided I added the delegation ?
>digg shows something like:
>;; AUTHORITY SECTION:
>mel.domain.com.7200IN  NS  ad.domain.com.

This answer is not stating that it's authorative, but only that authorities 
are below.
My wild guess ont what's happening, and why disabling forwarders fix this:
without NS m.domain.com is authorative for mel.domain.com, so it answers for 
A mel.domain.com without issues.
Now, with NS, it's not authorative, as you've just set up a delegation. So, 
when it receives the question it forwards it to one of three forwarding 
servers. And they probably don't know how to access ad.domain.com (as it has 
private IP adress, and these are public - that's one part of guess), they 
end up not resolving the name.

Can verify that 203.59.24.3; 203.0.178.191; 203.134.24.70; can call 
192.168.0.3, on that address?

Also, keep in mind that normally you should not use only one NS per 
delegation, but a minimum of two. Here, for a testing environment (I guess) 
it'll work, but don't do it on production environment.

Torinthiel

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: about the file command

2011-02-08 Thread Torinthiel
Dnia 2011-02-08 17:40 Terry. napisał(a):

>Hi list,
>
>Can BIND's "file" command referer to more than one zone file?
>For example,
>
>  zone "test.nsbeta.info" {
>   type master;
>   file "a.db";
>   file "b.db";
>  };
>
>When a record doesn't exist in a.db, BIND will continue to look for it in 
b.db.

And when it exists in both? Take from a? take from b? take both?
And when there's A for a.example.com in a.db and MX for a.example.com in 
b.db? Does this count as existing or not?
I don't think it's possible. can't you do cat a.db b.db > use_this.db or 
$INCLUDE one of the files in the second?
or maybe ldns-read-zone to canonicalize records and then some awk to filter 
from second zone only records that don't exist in first one.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: multi-master with mysql backend

2011-02-08 Thread Torinthiel
Dnia 2011-02-08 16:47 fddi napisał(a):

>I need really something very simple:
>
>
>I have 2 domain name servers, I need them to be multi-master so I will 
>put a mysql instance on each one,
>the two mysql servers in sync whith each other.
>
>when one of the servers goes down, the other continue to work.
>
>There are very few entry in hte database let;s say 10 entries of 
>important internet services which must be
>always avaliable... that's it nothing complicate.

You really, really need a multi master for that? Like modyfing no both 
servers and/or unable to wait for the real master to go online?
Because it looks like a normal slave configuration to me.
Or, if you need to be able to modify records from both servers than maybe 
multi-master with rsync'ing to the other server will work? It's tricky, as 
you need to both rsync and then rndc reload, and remember to do it when you 
change anything OR the dead server goes up, but might be an option.

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: syntax/format of zone on slave $ORIGIN/paragraph - sorted?

2011-02-09 Thread Torinthiel
On 02/09/11 17:34, Walter Smith wrote:
> Hello,
> 
> I have bind/named running on Linux master and slaves. All is good, but
> now when I’m trying to clean up some old records – I realized that
> sorted zone on slaves are quite uneven. What I meant is, the $ORIGIN
> splits the zone into some unknown to me syntax/format. Is there anywhere
> I can find the description/documentation on it – How exactly slave parse
> the zone from master and puts all these arbitrary paragraphs with $ORIGIN.

$ORIGIN is simply appended to every name that does not have dot at the end.
So
$ORIGIN example.com
www a 1.2.3.4

and
www.example.com. a 1.2.3.4
are completely equivalent.

Now, why would you want to look into slave files, except for verifying
that the zone transfer succeeded?
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: syntax/format of zone on slave $ORIGIN/paragraph - sorted?

2011-02-11 Thread Torinthiel
Dnia 2011-02-10 15:49 Walter Smith napisał(a):

>Oh - the original thought was to re-shuffle/clean-up zone(s) on 
Master...and since Slave(s) has this "nice" $ORIGIN paragraphs - would be 
nice to combine all these unique $ORIGINs back on Master...

I personally find only one $ORIGIN at start of zone, and later using only 
relative names much more readable.

>By-the-way --- is there any simple way (WITHOUT modifying named.conf) to 
"axfr" zone within Master/Slave/loopback?

as said before, from slave (And maybe some other hosts, depending what you 
have in named.conf)
dig axfr @master your.zone > your.zone.dump
maybe add +noall +answer to get rid of (most) comments and useless stuff.
And you will get double SOA record, at start and end of file.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind on vps

2011-02-13 Thread Torinthiel
  root.mydomain.com. (
>   2011011901  ; Serial
>   8H  ; Refresh
>   2H  ; Retry
>   4W  ; Expire
>   1D) ; Minimum TTL
> @ IN  NS  ns1.mydomain.com.
> @ IN  NS  ns2.mydomain.com.
> 44IN  PTR mydomain.com.
> 44IN  PTR www.mydomain.com.
> 45IN  PTR virtualdomain.com.
> 45IN  PTR www.virtualdomain.com.
> 44IN  PTR ns1.mydomain.com.
> 45IN  PTR ns2.mydomain.com.


First, as stated before, I doubt if anyone will ask your server for that
info. Second - what is the name of 11.22.33.44? Is it mydomain.com?
www.mydomain.com? ns1.mydomain.com? AFAIK there can be only one PTR record.

> 
> --- end config files -
> 
> In case my configuration is OK,
> what must I ask to my vps provider?

Probably nothing. If you can dig/nslookup on your host from external
hosts, then it looks they don't need to do anything.

> what must I do at go daddy?

Make sure your primary domain has correctly configured ns names AND IP
addresses. I'd advice dig ns mydomain.com @a.gtld-servers.net (or any
other name server for your TLD)


> At go daddy I added ns1.mydomain.com and ns2.mydomain.com
> records and associate them to the two ips in its web
> interface.
> 
> At my vps panel I have an option to reverse address domain
> names, could it confuse dns?  Must I use this registers or
> must I leave it blank?  I case it is convenient setup a domain
> name at VPS dns, what can I put there? 

Those are the PTR records. For DNS you probably don't need them For
email you definitely do, for WWW probably not.

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: bind on vps

2011-02-13 Thread Torinthiel
On 02/13/11 17:16, Walter Alejandro Iglesias wrote:
> On Sun, Feb 13, 2011 at 02:13:48PM +0100, Torinthiel wrote:
> 
>> On 02/13/11 12:52, Walter Alejandro Iglesias wrote:
>>> It will be a web hosting sever.  I wrote my own web client
>>> panel and my own bash scripts to automate the upload of new
>>> client's virtual domains.  That's why I want to run my own dns
>>> server; I want to be able to update the registers in my own
>>> machine.
>>
>> you do know that you should have two SERVERS for your dns?
>> Giving two different IPs for your box will work. but is a very bad idea.
>> Even if everything else is on that machine, for some uses (eg. mail)
>> having no DNS data is worse than having a failed server.
> 
> I read in forums about people that could run their own DNS
> server at the same server they had their sites, that's why I
> tried.  But I know (and I understand why) that the good
> practice is to have two external DNS servers in different
> locations.  

It's not only good practice, it's a requirement per RFC103[45]. You'll
go by with two IPs for one machine, and if it's only HTTP there won't be
enough difference if this machine fails. However you could also consider
looking for some other DNS services. Some ISPs provide secondary for
free, there might also be a free DNS service somewhere. Or you could
find someone in similar situation as you and be secondary for each other.


> 
>>> Reverse zone
>>> 
>>> ; 11.22.33
>>> $TTL86400
>>> @   IN  SOA ns1.mydomain.com.   root.mydomain.com. (
>>> 2011011901  ; Serial
>>> 8H  ; Refresh
>>> 2H  ; Retry
>>> 4W  ; Expire
>>> 1D) ; Minimum TTL
>>> @   IN  NS  ns1.mydomain.com.
>>> @   IN  NS  ns2.mydomain.com.
>>> 44  IN  PTR mydomain.com.
>>> 44  IN  PTR www.mydomain.com.
>>> 45  IN  PTR virtualdomain.com.
>>> 45  IN  PTR www.virtualdomain.com.
>>> 44  IN  PTR ns1.mydomain.com.
>>> 45  IN  PTR ns2.mydomain.com.
>>
>>
>> First, as stated before, I doubt if anyone will ask your server for that
>> info.
> 
> Stop here, this is my obscure point: how do you get that your
> dns be asked?  What do you need?  What must I ask to my isp
> (my vps provider in this case) for?  What do you mean by "to be
> designated nameserver for the IPs"?

Generally (not only for reverse DNS) you need one thing: delegation.
That is, the parent zone (this being .com for mydomain.com and
22.11.in-addr.arpa here) needs to answer 'I don't know about
mydomain.com, ask ns.mydomain.com'. And that's the part your server has
nothing to say yet, as it happens before query reaches your server.
Usually (that being the three places I know personally ;) the place
where you register your domain has some kind of web panel where you can
either setup the zone (if you use their nameservers) and/or enter the
nameservers you want to handle queries. And that's the part you want to do.

Now, specific about this part: first, disclaimer: I've never
administrated any reverse zones.
But still, probably your ISP/VPS provider would be the place to ask. Try
doing dig -x 11.22.33.44, and if it returns anything, then you have
reverse set up. Maybe some web panel from your ISP allows you to change
that to anything else, and maybe you even need it. But if you are doing
only HTTP and DNS than anything would be fine, as long as it resolves to
anything, and resolves back to you (so if you do dig -x 11.22.33.44 and
then dig what-you-got-from-previous you end with 11.22.33.44).
IMHO you don't need to handle any in-addr.arpa zone at all, your ISP
does it for you. You could change what it resolves to, via a web
interface and/or email directly to them,but chances are you don't need it.

>> Second - what is the name of 11.22.33.44? Is it mydomain.com?
>> www.mydomain.com? ns1.mydomain.com? AFAIK there can be only one PTR record.
>>
> 
> Yes, I release of my mistake.  Just one domain for ip.
> 
>>> In case my configuration is OK,
>>> what must I ask to my vps provider?
>>
>> Probably nothing. If you can dig/nslookup on your host from external
>> hosts, then it looks they don't need to do anything.
>>
> 
> This is exactly what a cannot do: to dig/nslookup from
> external hosts.

Not exactly. You've stated 

Re: multi-master with mysql backend

2011-02-14 Thread Torinthiel
Dnia 2011-02-14 15:52 Mike Mitchell napisał(a):

>I'd keep two copies of the BIND config, one that has all the zones as 
"master", and one that has all the zones as "slave".  When the master dies, 
run a little script on a slave that freezes the zones, edits the SOA to make 
that server the MNAME and increment the serial, then thaws the zone. Swap 
out the config with the "master" config, and now you have a new master.
>
>Before the broken master comes back online, swap out its config with the 
"slave" config.
>
>No need for rsync or mysql, BIND replication does all the work for you.  
Just be sure the updates go to the server listed in the MNAME field of the 
SOA.

Nice idea. I'd go even further - why keep two configs? Have a file with your 
list of zones, and two scripts that generate either master or slave config. 
Now you are keeping one common config on both severs, which changes only 
when you add/remove a zone, and two scripts which are almost identical, 
except for one line (master address). This should be easier to maintain.
Now, just in case, you could put on startup scripts the one that generates 
slave config, so if it reboots you don't have two master servers.
And you could cook up a more complicated script, that tries to ping the 
other server and runs master config generation, freeze, soa change, thaw, 
reload and send you an email - and you have fully automated HA.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Please Help

2011-02-16 Thread Torinthiel
On 02/16/11 23:24, Xiaoxu Huang wrote:
> From couple of our DNS servers, we are failed to get correct DNS answer
> like followings:
>
> 1) From server A
> # nslookup
> Default Server:  localhost
> Address:  127.0.0.1
> > www.nyc.gov
> Server:  localhost
> Address:  127.0.0.1
> *** localhost can't find www.nyc.gov: Non-existent host/domain#nslookup
>
> 2) From server B:
> # nslookup
> > www.nyc.gov
> ;; connection timed out; no servers could be reached
>
> 3) Both servers run bind-9.7.2-P2

And your configuration is? (both named.conf and network topology)

Try (from both servers)
a) dig @127.0.0.1

b) ping 198.41.0.4 (which is a.root-servers.net's IP address)
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Question about some oddities in the logs

2011-02-22 Thread Torinthiel
On 02/22/11 01:41, Eivind Olsen wrote:
> Hello. I've recently put into production a new recursive nameserver, and
> decided to take a look in the logfiles (the old servers didn't have
> logging enabled so I can't really compare the current logs with whatever
> the old ones would have been).
> I understand most of the entries in the logs + statistics, but there's a
> couple of things I'm not sure about - my hope is that someone here can
> shed some light on these, and perhaps also tell me if it's expected to see
> these in the wild.
> 
> The nameserver is running BIND 9.7.2-P3 btw, and yes I know 9.7.3 is out -
> it will be upgraded soon.
> 
> We're not talking about query logging btw, only a fairly simple logging
> channel:
> 
> channel default_debug {
> file "logs/named.run" versions 20 size 500m;
> print-time yes;
> print-category yes;
> print-severity yes;
> severity dynamic;
> };
> 
> Now, to the log entries (I've removed timestamps + IP-addresses):
> 
> 1) notify: notice: client x.x.x.x#n: notify question section contains no 
SOA
> Should I be seeing these normally? They only seem to make up a small part
> of the full logfiles, still seeing a couple of thousand of these in just a
> few days time.

Hmm, looks to me as the box listed as client sends some strange notify
messages. Notify normally should contain SOA, so that receiving NS can
tell if it has outdated zone or no. These don't. What (regarding DNS of
course) is on those machines?


> 2) security: info: client x.x.x.x#n: query (cache) './A/CH' denied
> Not many of these either, but they still seemed a bit weird. Could they be
> caused somehow by me running a slave of the root "." defined as:
> zone "." IN {
> type slave;
> file "slave/root.zone";
> masters {
> ...a couple of the root-servers.net servers
> };
> notify no;
> };
> I wouldn't expect that to be the cause though, as it's defined as class IN
> and not CH.

asking for CH TXT version.bind returns bind's version, unless configured
not to do so. Maybe something also asks for A, but I dunno why. Are
these addresses in your network? Then you can tracethem down probably.

Now, the more important part - why would you be running a slave of root?
AFAIK the root servers don't a) allow transfer b) send you notifies, so
you'll be in trouble as soon as anything changes, which means every week
right now, that root is signed. Why is
zone "." in { type hint; }
not enough for you?

Regards,
  Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind and IPV6

2011-02-22 Thread Torinthiel
Dnia 2011-02-22 22:16 Mark Andrews napisał(a):

>In message , hugo hugoo writes:
>> Dear all,
>>  
>> In the scope of the IPV6 deployment, I have been asked if oiyr DNS server
>> s are IPV6 compliant.
>> We are now upgrading all our servers to bind-9.6-ESV-R3.
>>  
>> - Can anybody give some feedback on the IPV6 compliancy?
>>IS bind-9.6-ESV-R3 totally compliant with IPV6?
>
>Yes.

But a different issue might be is your system (the box Bind runs on, network,
 routers, firewalls) IPv6 compliant.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: mx selection order

2011-02-22 Thread Torinthiel
Dnia 2011-02-22 20:29 Terry. napisał(a):

>Hello,
>
>Given I have these MX records:
>
>example.com.3600IN  MX  10  m1.example.com.
>example.com.3600IN  MX  10  m2.example.com.
>example.com.3600IN  MX  20  m3.example.com.
>
>
>My question is, when m1.example.com is failed to communicate with, the
>remote MTA will continue to talk to m2 or m3?


From the beginning: MTA should randomly try m1 or m2, if it fails then the 
other one, and if both fail than m3.
algorithm is simple:
try random one from amongst ones with lowest precedence, discarding those 
failed.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Question about some oddities in the logs

2011-02-22 Thread Torinthiel
Dnia 2011-02-22 13:29 Eivind Olsen napisał(a):

>On Tue, 22 Feb 2011 08:59:51 +0100, "Torinthiel" 
>wrote:
>> Hmm, looks to me as the box listed as client sends some strange notify
>> messages. Notify normally should contain SOA, so that receiving NS can
>> tell if it has outdated zone or no. These don't. What (regarding DNS of
>> course) is on those machines?
>
>These come from a variety of IP-addresses, belonging to customers
>(we're an ISP). So I don't know what's really on the customers machines.

If your clients should send you notify messages (e.g. you host their 
secondary DNS, while they have the primary), and if there are no other 
symptoms of malfunction, I'd ignore it. they have no reason to send you 
notifies, then maybe you can ask them why are they sending it in the first 
place (assuming there's someone worth talking to). But still, I think it's 
safe to ignore.


>> asking for CH TXT version.bind returns bind's version, unless configured
>> not to do so. Maybe something also asks for A, but I dunno why. Are
>> these addresses in your network? Then you can tracethem down probably.
>
>These are again from customers addresses.

I'd ignore it. If someone thinks otherwise, please step up.

>
>> Now, the more important part - why would you be running a slave of root?
>> AFAIK the root servers don't a) allow transfer b) send you notifies, so
>> you'll be in trouble as soon as anything changes, which means every week
>> right now, that root is signed. Why is
>> zone "." in { type hint; }
>> not enough for you?
>
>At least some of the root servers allow transfers. They won't send me
>notifies, true. But I don't need that. Currently the root zone has a
>refresh value of 1800 seconds and expire = 604800 seconds, so my slave
>servers will check the root for updates often enough.
>One advantage is that we can now instantly reject queries for things
>like "eivind.local." instantly without having to ask the root servers
>where "local." is served.

Do these happen often enough to warrant such a setup? Ok, it looks it will 
work, but you are trading a few (asuming few such TLDs) *possible* queries 
per day, for a full zone transfer every  few days.

Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Help on recursive set up

2011-02-23 Thread Torinthiel
Dnia 2011-02-23 17:59 rams napisał(a):

>Hi,
>Could you please tell me how to set up for recursive server for NS
>delegation records.

I know what a recursive nameserver is. I know what NS delegation record is.
I have no idea what a recursive nameserver for NS delegation records is. 
Recursive nameservers/resolvers by definition deal with delegation records, 
so either you're stating the obvious or missed some critical piece of 
information.
In the first case, just use named.conf from distribution examples, IIRC 
there was a simple recursive example somewhere, maybe even the default 
named.conf has related config (and/or comments).
Regards,
 Torinthiel


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: why dig +short for NS doesn't get the result

2011-02-28 Thread Torinthiel
On 03/01/11 04:55, terry wrote:
> server1:/var/cache/bind# dig ox.test.nsbeta.info ns @localhost +short
> 
> # got nothing here
> 
> 
> server1:/var/cache/bind# dig ox.test.nsbeta.info ns @localhost
> 
> ; <<>> DiG 9.6-ESV-R3 <<>> ox.test.nsbeta.info ns @localhost
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53460
> ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
> ;; WARNING: recursion requested but not available
> 
> ;; QUESTION SECTION:
> ;ox.test.nsbeta.info.   IN  NS
> 
> ;; AUTHORITY SECTION:
> ox.test.nsbeta.info.20222   IN  NS  dwdns1.nsbeta.info.

Look where the answer is

> 
> ;; Query time: 0 msec
> ;; SERVER: 127.0.0.1#53(127.0.0.1)
> ;; WHEN: Tue Mar  1 11:51:21 2011
> ;; MSG SIZE  rcvd: 58
> 
> 
> I have setup the NS for ox.test.nsbeta.info zone, why dig +short gets
> nothing but dig does get the result?

+short instructs dig to only write extract of ANSWER section. your reply
is in authorative section.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: inconsistency dnssec debuguers response and writing conseil for new areas zone

2011-03-01 Thread Torinthiel
On 03/01/11 20:17, fakessh @ wrote:

> is the repeat isc dlv seems to accept the flag DS 
> in my case i have to a file dsset-fakessh.eu 
> but the file contains two keys DS and i don't know which to use

The DS you have are both for the same key, only one is SHA1 and other
SHA256. You could try any of them, but see below.

ISC DLV accepts keys, you have to create an account, add your zone and
keys for it. I remember having some trouble trying to add DS records,
but DNSKEY worked fine. Of course the zone has to be signed using that
key, and ISC asks you to add a TXT record at dlv.your.zone (or something
similar) to prove your ability to modify the zone.
The procedure is simple and well defined.

And about OVH - I don't know if it's related, but I've asked Polish OVH
how about providing DNSSEC, as .pl is planned to be signed mid-year, and
they've answered me they will probably be ready. This might, or might
not be related to providing DNSSEC by other OVH branches and for other
registries.

Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: inconsistency dnssec debuguers response and writing conseil for new areas zone

2011-03-01 Thread Torinthiel
On 03/01/11 21:52, fakessh @ wrote:
> as I now know what key DS uses. 

That would be the key with id 47103 in your case. The one that has SEP
flag, the one that only signs DNSKEY records and not others.
Regards,
 Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Having trouble with logging syntax

2011-03-03 Thread Torinthiel
Dnia 2011-03-03 13:30 Nate Homier napisał(a):

>I got my logging setup but named-checkconf is spitting out an error.
>
>$named-checkconf /home/nate/named.conf.local
>/home/nate/named.conf.local:11: missing ';' before '3'
>/home/nate/named.conf.local:11: unknown option '3'
>
>I'm pretty sure we don't put an ; after version.  I can't see anything
>wrong with my config.  All my ; look to be in place.  I'm using Ubuntu
>10.04.  This is strictly a resolver server on my personal PC at home.
>
>My logging setup.
>
>logging {
>channel query.log {
>file "/var/log/query.log" version; 3 size 5m;

that would by file "/var/log/query.log" version 3 size 5m;
You want 3 versions, so why separate keyword from its parameter?
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: about AUTHORITY SECTION

2011-03-04 Thread Torinthiel

Dnia 2011-03-04 23:07 terry napisał(a):


>> Look at RA and RD.  If the server recurses, you will get a answer.
>> If the server does not recurse, you will get a referral.  Then there
>> are the really old broken servers which get this wrong.
>>
>
>Hi Mark,
>
>Please see this for details:
>
>$ dig nsbeta.info ns @ns34.domaincontrol.com
>
>; <<>> DiG 9.4.2-P2.1 <<>> nsbeta.info ns @ns34.domaincontrol.com
>;; global options:  printcmd
>;; Got answer:
>;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41454
>;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
>;; WARNING: recursion requested but not available
>
>;; QUESTION SECTION:
>;nsbeta.info.   IN  NS
>
>;; ANSWER SECTION:
>nsbeta.info.3600IN  NS  ns34.domaincontrol.com.
>nsbeta.info.3600IN  NS  ns33.domaincontrol.com.
>
>
>There isn't the "ra" flag in the response, why the nameserver has been
>also answering with the "ANSWER SECTION"? I think it should answer
>with the "AUTHORITY SECTION".

But in this case, you're asking the authotrative server. Authorative server 
answers in answer section, as it knows the answer. Authorative section is 
for 'I don't know, ask ...'
The rule above goes for servers which are not authorative for a given zone.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: About name servers registration

2011-03-10 Thread Torinthiel

Dnia 2011-03-10 09:53 terry napisał(a):

>Hello,
>
>How do I know  that my name servers, ns1.dnsbed.com and
>ns2.dnsbed.com, have been registered in ICANN?

AFAIK ICANN does not run .com registry, VeriSign does.
But this doesn't change anything.

First, your nameservers will not be registered per se. But your nameservers 
may be registered as 
authorative for your domain, which I guess is dnsbed.com
And you can check this with
dig ns com
to get a list of nameservers for .com (or whatever your parent domain is)
then pick any, say 
b.gtld-servers.net
and type
dig ns dnsbed.com @b.gtld-servers.net

which right now returns dns[1-4].registrar-servers.com, so not the ones 
you've typed.
And, as your servers don't answer for
dig ns dnsbed.com @ns1.dnsbed.com

then I guess my original assumption of your domain has been wrong. Bujt the 
procedure still is same.
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Master ns on internal lan

2011-03-20 Thread Torinthiel
On 03/20/11 11:13, x_bind-user...@nospam.pz.podzone.net wrote:
> Hi,
> 
> I'm trying to figure out how to configure my nameservers so that the
> master can reside on an internal LAN *only* address.
> 
> I already have it configured such that the master is (almost) hidden
> while residing on a public IP.  So I should present that first:
> 
[cut]
> 
> As you can see, ns0 isn't quite totally hidden - it shows up in the
> SOA record.  I tried using ns1 in the SOA but then ns1/ns2 failed to
> update correctly when the zone file was updated on ns0.  I never
> figured that out and don't see it as a big deal from a privacy POV but
> I accept that probably it's not optimally configured.

And solving your main problem will probably solve this as well.


> Now on to my question. ;-)
> 
> Ideally I would like to manage the zones on a main internal server,
> which would serve the internal LAN (including an internal-only zone)
> as well as somehow keeping the public slaves up to date.  Part reason
> for this is a policy to shift all internal services onto the LAN and
> away from the DMZ.
> 
> This is the plan:
> 
> main.mydomain.net - Internal LAN only.
> 
> ns0.mydomain.net - Gateway/firewall, public IP (ADSL) + internal LAN.
> 
> ns1.mydomain.net - Public nameserver.
> 
> ns2.mydomain.net - Public nameserver.
> 
> main acts as master for ns0 slave. (and serves dns for the lan)
> 
> ns0 acts as master for ns1/ns2 slaves. (and serves dns for the dmz)
> 
> This is the problem, I cannot see how to configure the SOA and conf
> files such that zone updates will be notified main -> ns0 -> ns1/ns2.

try putting this in config:
on main:
zone "mydomain.net" {
type master;
...
allow-transfer { ns0.mydomain.net; };
also-notify { ns0.mydomain.net; };
}

on ns0:
zone "mydomain.net" {
type slave;
...
allow-notify { main.mydomain.net; };
allow-transfer { ns1.mydomain.net; ns2.mydomain.net; };
also-notify { ns1.mydomain.net; ns2.mydomain.net; }
}


on ns1/2:
zone "mydomain.net" {
type slave;
...
allow-notify { ns0.mydomain.net; };
}

The allow-notify makes slave servers to accept notify messages from
someone that's not listed as master in SOA. Putting this on ns1/2 will
probably solve your first issue, with ns0 not completely hidden.

also-notify makes bind send notify messages to those servers. Probably
also-notify on ns0 is not needed, as ns1/2 are listed in zone as NS. But
on main it will be neeed, as ns0 is not listed as NS for your domain.

If you want to put ns1 at SOA as master, then you'd also need notify no
at ns1 (so it won't send notifies at all), and notify-to-soa yes at ns0
(so it will send notify to ns1).

Oh, and I really hope ns0.mydomain.net has static IP address even though
it has ADSL. If no, you can either use ip/length or (even better) use
TSIG keys as authentication.

Regards,
 Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread Torinthiel
On 03/20/11 22:33, fakessh @ wrote:
> and what do I do. 

You have to add your key to ISC's DLV registry. Go to dlv.isc.org,
create account, login, add a zone, add keys for it and publish a record
in your zone validating that you're the owner of the zone. You will be
told what to do after you create zone.

> and what is this other publication of another DS

I have no idea what do you mean by this sentence.
Torinthiel

> 
> 
> Le lundi 21 mars 2011 à 08:25 +1100, Mark Andrews a écrit :
>> In message <1300650238.6651.15.camel@localhost.localdomain>, "fakessh @" 
>> writes
>> :
>>> hello bind network and duru. 
>>>
>>> I can not validate the key dlv via the website of the isc. 
>>> I do not understand why the warning is the isc 
>>> you have an explanation
>>> SUCCESS 94.23.59.30 answered DNSKEY query with rcode NOERROR
>>> 4.502:SUCCESS 87.98.164.164 answered DNSKEY query with rcode NOERROR
>>> 4.502:SUCCESS 87.98.186.232 answered DNSKEY query with rcode NOERROR
>>> 4.502:INFO Total answers: 3
>>> 4.503:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.164.164
>>> 4.504:DEBUG COMPARE: Comparing results from 94.23.59.30 to 87.98.186.232
>>> 4.504:SUCCESS All DNSKEY responses are identical.
>>> 4.515:DEBUG VERIFY-DNSKEY: Checking tag=10231 flags=257 alg=RSASHA1
>>> AwEAAbwO...8fkjXphfS8=
>>> 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
>>> 4.515:DEBUG VERIFY-DNSKEY: Checking tag=30111 flags=256 alg=RSASHA1
>>> AwEAAb1q...jG+UQeAtYE=
>>> 4.515:DEBUG VERIFY-DNSKEY: Ignoring key.
>>> 4.515:INFO VERIFY-DNSKEY: 2 DNSKEYs found.
>>> 4.515:INFO VERIFY-DNSKEY: 0 keys found after filtering.
>>> 4.515:DEBUG VERIFY-DNSKEY: Using keys:
>>> 4.516:DEBUG VERIFY-DNSKEY: To verify rrset type DNSKEY
>>> 4.516:FAILURE VERIFY-DNSKEY: No keys found after filtering.
>>> 4.516:FAILURE DNSKEY signature did not validate.
>>> 4.516:FINAL_FAILURE FAILURE
>>
>> Based on the key tags and the truncated keys I think these keys are
>> for fakessh.eu and if so there isn't a DLV record or a DS published
>> for fakessh.eu.  The only other thing the validator can check against
>> is any installed trust-anchor.
>>
>> Mark
>>
>> ; <<>> DiG 9.6.0-APPLE-P2 <<>> fakessh.eu.dlv.isc.org dlv
>> ;; global options: +cmd
>> ;; Got answer:
>> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48161
>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
>>
>> ; <<>> DiG 9.6.0-APPLE-P2 <<>> fakessh.eu ds
>> ;; global options: +cmd
>> ;; Got answer:
>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63623
>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
>>
>>
>>
>>> -- 
>>> gpg --keyserver pgp.mit.edu --recv-key 092164A7
>>> http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x092164A7
>>>
>>>
>>>
>>> ___
>>> bind-users mailing list
>>> bind-users@lists.isc.org
>>> https://lists.isc.org/mailman/listinfo/bind-users




signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem validate key of isc dlv

2011-03-20 Thread Torinthiel
On 03/21/11 02:13, fakessh @ wrote:
> Yes, I bothered to redeploy new keys, fields TXT, a new signature. 
> and more on a new rehabilitation isc dlv. 
> 
> 
> I still get the same error
> 
> nb : Simply debuggers dnssec still provide all kinds of resultasts

And that's probably the main problem. Two of your nameservers have
either disabled DNSSec, or don't support it at all:

Correct answer:

$ dig +dnssec +norecurse +noall +answer dnskey fakessh.eu @r13151.ovh.net.
fakessh.eu. 38400   IN  DNSKEY  257 3 5
AwEAAbwO9edhHAn00RfAzMEwBdcYK1fnP16vh9BXltHrdAesHRFJ7G0l
tT4GyBgQcjFZyfk/HdHpnlDuT8fkjXphfS8=
fakessh.eu. 38400   IN  DNSKEY  256 3 5
AwEAAb1qeaah5D2pS+IcZiJiyZRA3KTgaV0/Sd8kSfzfbI3X45XZ7aLb
tIoN/kLJc2G7qAdqnSmoiN+TojG+UQeAtYE=
fakessh.eu. 38400   IN  RRSIG   DNSKEY 5 2 38400
20110419151040 20110320151040 10231 fakessh.eu.
VeCJRPlvC6gr+3f/OuMCrFQR42oQkDxJ7nTfLcJMH2XwPyvBOdR/nv55
ZSs5wJ5Bl5CKAZjMRyWrUtM/wSGdTw==
fakessh.eu. 38400   IN  RRSIG   DNSKEY 5 2 38400
20110419151040 20110320151040 30111 fakessh.eu.
Y1DqOwGfRTxNdFruvOSalp8pVy+FWd/G+pqs+Qu4tkkLvanHcTisDSXA
JqbKvZpRrwGoL9o+5wKwPisDDqtf6g==


And incorrect (note missing RRSIGs):
dig +dnssec +noall +answer dnskey fakessh.eu @ns0.xname.org.
fakessh.eu. 38400   IN  DNSKEY  257 3 5
AwEAAbwO9edhHAn00RfAzMEwBdcYK1fnP16vh9BXltHrdAesHRFJ7G0l
tT4GyBgQcjFZyfk/HdHpnlDuT8fkjXphfS8=
fakessh.eu. 38400   IN  DNSKEY  256 3 5
AwEAAb1qeaah5D2pS+IcZiJiyZRA3KTgaV0/Sd8kSfzfbI3X45XZ7aLb
tIoN/kLJc2G7qAdqnSmoiN+TojG+UQeAtYE=

dig +dnssec +noall +answer dnskey fakessh.eu @ns2.xname.org.
fakessh.eu. 38400   IN  DNSKEY  256 3 5
AwEAAb1qeaah5D2pS+IcZiJiyZRA3KTgaV0/Sd8kSfzfbI3X45XZ7aLb
tIoN/kLJc2G7qAdqnSmoiN+TojG+UQeAtYEA
fakessh.eu. 38400   IN  DNSKEY  257 3 5
AwEAAbwO9edhHAn00RfAzMEwBdcYK1fnP16vh9BXltHrdAesHRFJ7G0l
tT4GyBgQcjFZyfk/HdHpnlDuT8fkjXphfS8A

ISC doesn't publish your DLV record, because it has to see consistent
view of your zone. And it doesn't as you have missing RRSIGS from some
nameservers.
Either convince admins to deploy DNSSec or drop those nameservers.
Then it should work.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: gid expected error

2011-03-26 Thread Torinthiel
On 03/26/11 07:01, Tim Dunphy wrote:
> hello,
> 
>  a file was apparently modified in our setup and now bind9 refuses to
> start. This is the error message we receive
> 
> [root@LBSD2:/etc/namedb/master] #/etc/rc.d/named start
> dev changed
> gid expected 10 found 0 modified

Guessing by this, I'd do ls -ld /dev /dev/{log,null,random,urandom,zero}
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Error in bind manpage?

2011-03-26 Thread Torinthiel
I've noticed a probable error in dnssec-signzone's man page.

Description for option -T says that "the default is the minimum TTL
value from the zone's SOA record". But my tests show, that the default
is the TTL of the SOA itself. Which by the way makes much more sense, as
minimum/negative TTL is usually much lower than SOA's TTL.

Using bind version 9.7.2-P3.

Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Error in bind manpage?

2011-03-27 Thread Torinthiel
On 03/27/11 09:07, Mark Andrews wrote:
> Could you please send it to bind9-bugs.  That way it will be tracked.
Thanks for the pointer, did that.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem for validate the script dnssec to isc dlv

2011-03-27 Thread Torinthiel
On 03/27/11 19:09, fakessh @ wrote:
> in insurance I googled
> no result
> 
> how to do this ...

The procedure is everywhere around the ISC site.
See eg.

http://www.isc.org/solutions/dlv

https://dlv.isc.org/about/using

my mail on 3rd jan, 21:00 in reply to yours (thread inconsistency dnssec
debuguers response and writing  conseil for new areas zone)

Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: problem for validate the script dnssec to isc dlv

2011-03-27 Thread Torinthiel
On 03/27/11 20:45, fakessh @ wrote:
> That would be the key with id 47103 in your case. The one that has SEP
> flag, the one that only signs DNSKEY records and not others.
> Regards,
>  Torinthiel
> http://www.mail-archive.com/bind-users@lists.isc.org/msg09107.html
>
> This is your word
>
> i reread the thread to fevrier
> http://www.mail-archive.com/bind-users@lists.isc.org/msg09084.html
>
> Mark Andrews quote 
> Because there are already DLV records for the key in the DLV.
>
> ;; ANSWER SECTION:
> fakessh.eu.dlv.isc.org. 3529IN  DLV 47103 3 2 
> 68096942650C1DD89D5BE43A9EEA05BA9C20F09EDC55309F4F1CD348 4D8ED07B
> fakessh.eu.dlv.isc.org. 3529IN  DLV 47103 3 1 
> CFEA04C5B918359273D6BAC07AE7F2DF5225E357
>
>
> here i am 
Ok. Now, reread the current thread. At least three people in this thread
only have identified and pinpointed the problem. Two of your
nameservers, ns0.xname.org and ns2.xname.org do not support DNSSec right
now. Unless you do something about this, possibilities include fixing
them or dropping them from your authoritative servers, there's nothing
anyone can help you. Your zone is NOT DNSSec enabled, and ISC's DLV
registry correctly refuses to list it's keys. If you don't trust us,
please go to http://dnsviz.net/d/fakessh.eu/dnssec/ or
http://secspider.cs.ucla.edu/fakessh-eu--zone.html, probably your
account in dlv.isc.org or any DNSSec debugger of your choice.
I've really assumed that you've fixed issues that were pointed numerous
times before asking for next steps.

Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Trouble loading a zone file after updating BIND

2011-03-30 Thread Torinthiel
On 03/31/11 04:54, Mike Diggins wrote:
> The A records for the two nameservers exist in the sub.Domain.CA zone
> file. I can fix the error by adding the two nameserver A records to the
> Domain.CA zone file but I'm wondering why this is an error with 9.7, and
> not 9.2.1, and is this the correct way to fix this?

Yes, it is the correct way. These are so-called 'glue records' and are
needed if (and only if) the nameservers are below the zone apex. If you
have one NS below zone apex, and another somewhere outside, than you
need one glue record. And these are needed because server needs to know
about NS, master because it needs to send notify and other servers (like
.CA in your example) to provide correct referrals.

Probably in 9.2 it wasn't required, but according to RFC 1034, last
paragraph of section 4.2.1, it is correct behaviour to require it.

Torinthiek



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: BIND 9 And Short Name resolution Problem

2011-03-31 Thread Torinthiel
On 03/31/11 20:58, Barry Finkel wrote:
> On 03/31/11 13:17, bind-users-requ...@lists.isc.org wrote:
>> Hello,
>>
>> I get the following messages on the BIND server when I do a short name
>> nslookup from a client:
>>
>> Mar 31 14:08:04 jedi named[1299]: [ID 873579 daemon.info] network
>> unreachable resolving 'C.ROOT-SERVERS.NET//IN':
>> 2001:500:1::803f:235#53
>> Mar 31 14:08:05 jedi named[1299]: [ID 873579 daemon.info] network
>> unreachable resolving 'I.ROOT-SERVERS.NET//IN':
>> 2001:500:1::803f:235#53
>> Mar 31 14:08:07 jedi named[1299]: [ID 873579 daemon.info] network
>> unreachable resolving 'B.ROOT-SERVERS.NET//IN': 2001:500:2f::f#53
>> Mar 31 14:08:07 jedi named[1299]: [ID 873579 daemon.info] network
>> unreachable resolving 'L.ROOT-SERVERS.NET//IN': 2001:500:2f::f#53
>>
>> The config files are below, we are running BIND 9 on Solaris 10. We
>> currently have 2 domain names configured and on IP address on the BIND
>> server itself. Any ideas from the gurus??
>>
>> Thanks
> 
> You do not have IPv6 connectivity from the DNS server to
> {C,I,B,L}.root-servers.net.

And is it possible to make BIND stop trying to use IPv6 at all? I'm in a
similar situation, I know I have connection issues and I simply want
bind to either not use IPv6 or at least prefer IPv4.
liste-on-v6 {none;} in named.conf does not help, and I'm not much
surprised, as it's about listening and not querying.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Zone File IP address/Hostname

2011-03-31 Thread Torinthiel
On 04/01/11 03:47, Tony MacDoodle wrote:
> Hello,
>  
> I am trying to configure 2 different domains on one host that only has
> one physical interface plummed.
>  
> I think I have an errorthat I list the hostname of the interface in both
> zone files as below and this might be why I can't resolve properly. Do
> you see any mistakes in the files below?
> The only active interface is 192.168.5.5

and you can't resolve properly from where? From localhost? That's
probably because you've configured BIND to only listen on external
address, not the local one. In this config (listen-on { 192.168.5.5; };)
it won't accept local queries, as these come to 127.0.0.1.

But from other box command
dig rac-scan.rac.local @192.168.5.5 should work.

Are there any relevant messages in logs? What are the error
messages/results when you try to resolve? How you test if resolution works?

Having bind run multiple zones is absolutely normal, and there are no
reasons to require more than one IP address with that.
Torinthiel


>  
> root:/var/named# cat named.conf
> options {
> listen-on-v6 { none; };
> listen-on { 192.168.5.5; };
> directory "/var/named";
> };
> zone "0.0.127.in-addr.arpa" {
> type master;
> file "db.127.0.0";
> };
> zone "rac.local" {
> type master;
> file "db.rac";
> };
> zone "rac2.local" {
> type master;
> file "db.rac2";
> };
> zone "10.168.192.in-addr.arpa" {
> type master;
> file "db.192.168.10";
> };
> zone "20.168.192.in-addr.arpa" {
> type master;
> file "db.192.168.20";
> };
>  
> root:jedi:/var/named# cat db.rac
> $TTL 86400
> @   SOA jedi root ( 2 10800 3600 604800 600 )
> NS  jedi
> localhost   A   127.0.0.1
> rac-scanA   xxx.xxx.xxx.xxx
> A   xxx.xxx.xxx.xxx
> A   xxx.xxx.xxx.xxx
> MX  10 rac-scan
>  
> root:jedi:/var/named# cat db.rac2
> $TTL 86400
> @   SOA jedi root ( 3 10800 3600 604800 600 )
> NS  jedi
> localhost   A   127.0.0.1
> rac2-scan   A   xxx.xxx.xxx.xxx
> A   xxx.xxx.xxx.xxx
> A   xxx.xxx.xxx.xxx
> MX  10 rac2-scan



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Change Query Type on nslookup

2011-04-06 Thread Torinthiel
On 04/07/11 06:42, mee thun wrote:
> Good Morning..
> 
> I am new member in this mailing list. I need help to change the query
> type in the nslookup command.
> The default nslookup using A, but I use ipv6 so the query type must use
> . I don't know how to change the default nslookup from A to 
> permanently?

first, this is a bind list, and nslookup is not a bind tool. Consider
using dig, which is much better in this case.

And, IIRC, when you run nslookup you can put
set type=
yourquery.com

and that should give the effect you want
I have no idea how to change the default query type for any of the tools.

Torinthiel





signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNS queries with 3 networks

2011-04-08 Thread Torinthiel

Dnia 2011-04-08 09:11 Flex Banana napisał(a):

>hello floks,
>
>i have a DNS server running bind-9.7.3 on a linux box, 3 differents 
networks connected to 3 ethernet cards:
>
>eth0:  192.168.1.1/24
>eth1:  172.16.1.1/24
>eth2:  10.140.27.1/24
>
>i would like to have the same DNS resolving the good address from the good 
network, example:
>
>from the 192.168.1.1/24 network:   host mydns.example.com = 
>192.168.1.10
>from the 172.16.1.1/24 network:host mydns.example.com = 
>172.16.1.10
>from the 10.140.27.1/24 network:   host mydns.example.com = 
>10.140.27.10

The only way would be to create 3 different zone files, with those addresses,
 and 3 different views on this sever, each having a different zone file and 
configured for different networks
I don't have bind ARM on-hand, but there was a section on views.

Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: A beginners question regarding a caching-only name server

2011-04-08 Thread Torinthiel

Dnia 2011-04-08 21:58 Patrick Rynhart napisał(a):

>I am new to using BIND and thought that I would start by setting up a
>caching-only name server on a VM running CentOS 5.5.  While in this
>mode, my understanding is that named should be passively listening for
>any DNS requests that are resolved and be adding them to its local DB.
>
>Adding localhost to /etc/resolv.conf shouldn't be necessary in order for
>entries to be added to the DB but obviously required if you want to make
>use of the DNS caching.
>
>What I'm observing is that any DNS requests that are resolved aren't
>being added to the DB - i.e. the result of "rndc dumpdb" is always
>empty.  My named.conf file is as posted inline below; this is a vanilla
>named.caching-nameserver.conf (as packaged by CentOS) aside from my
>adding the VMWare subnet 192.168.239.0/24 which my VM is on.  I also
>post the output of "named -g" along with named.local below.

You say you successfully perform queries on that box. How are you doing 
this?
dig something @localhost
dig something
ping something

Last two might not work, as it asks resolver for that box, which is 
configured in resolv.conf and might not be localhost
The first is guaranteed to ask this bind.
Also,  see below for remarks on your configuration.


>named.conf
>--
>
>options {
>listen-on port 53 { 127.0.0.1; 192.168.239.0/24; };

192.168.239.0 should be a single address, not a range. It's address bind 
listens on, not the one it can receive queries from.


>//listen-on-v6 port 53 { ::1; };
>directory   "/var/named";
>dump-file   "/var/named/data/cache_dump.db";
>statistics-file "/var/named/data/named_stats.txt";
>memstatistics-file "/var/named/data/named_mem_stats.txt";
>
>// Those options should be used carefully because they
>// disable port randomization
>query-sourceport 53;
>query-source-v6 port 53;
>
>allow-query { localhost; 192.168.239.0/24; };
>allow-query-cache { localhost; 192.168.239.0/24; };
>};
>logging {
>channel default_debug {
>file "data/named.run";
>severity dynamic;
>};
>};
>view localhost_resolver {
>match-clients  { localhost; 192.168.239.0/24;};
>match-destinations { localhost; 192.168.239.0/24;};
>recursion yes;
>include "/etc/named.rfc1912.zones";
>};

You are sure you need view? This one here doesn't seem to add anything , and 
it does seem strange.
You specify here, that clients from your local IP subnet, that ask for names 
in your local IP subnet can ask recursive queries, and have some pretty 
standard zones.
My quess would be that it won't require recursive queries. And if you want 
to limit who can use your server recursively,
 its better to use option {allow-recursion{ 192.168.239.0/24;};}
Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: A beginners question regarding a caching-only name server

2011-04-08 Thread Torinthiel

Dnia 2011-04-08 23:00 Patrick Rynhart napisał(a):

>On 8/04/2011 10:11 p.m., Tony Finch wrote:
>
>> No, only DNS requests that are handled by the server itself are cached.
>> There is no sniffing going on.
>> 
>> Tony.
>
>Thank you for the clarification.  If I add "nameserver 127.0.0.1" to the
>VM (and comment out the existing name servers) and attempt to resolve a
>DNS entry, the I see output similar to the following:
>
>08-Apr-2011 22:51:50.116 network unreachable resolving
>'www.redhat.com/A/IN': 2001:500:2f::f#53
>08-Apr-2011 22:51:54.023 network unreachable resolving
>'www.redhat.com/A/IN': 2001:503:c27::2:30#53
>08-Apr-2011 22:51:54.024 network unreachable resolving './NS/IN':
>2001:503:c27::2:30#53
>
>I understand that this is because there is no upstream DNS for BIND as
>configured in my named.conf.  However, if I try to add a forward

It might be, but it also might be because you have no IPv6 connectivity.
Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNS record delegation

2011-04-10 Thread Torinthiel
On 04/10/11 20:42, Parashar Singh wrote:
> We want to be able to point the wild card (*.domain.com
> <http://domain.com>) and the root domain (domain.com
> <http://domain.com>) to the GLB’s while not breaking the other custom
> prefixes within that domain’s record (stage.domain.com
> <http://stage.domain.com>, foo.domain.com <http://foo.domain.com>, etc.).
> Except some 10-20 A records, as declared in zone file, for all other DNS
> lookup request shall be forwarded to Global Load Balancer.
> Allow any records on the DNS server to resolve to the respective records
> on DNS.
> All other records are captured by the wildcard and load balanced.
> The load balancers will forward the queries to the Apache web servers
> which will direct users to the appropriate website.
> 
> Can you suggest, how we can configure BIND to do above setup.


if you type
*.domain.com. IN A 1.2.3.4
in your zone file, bind interprets this as
"every record that is not configured otherwise should get a record of
type A and value 1.2.3.4"

So, if I understand correctly what you want to do, just specify normal A
records for special domains and root domain as well, and add the
wildcard record.

For this example assume 1.2.3.4 is IP of GLB, and 4.3.2.1 is IP of
machine serving other stuff.
So the following zone fragment should work

$ORIGIN domain.com.
@ SOA (...)
@ NS ...
@ A 1.2.3.4
stage A 4.3.2.1
foo  A 4.3.2.1
* A 1.2.3.4
END FRAGMENT

of course stage and foo can have different IP addresses, and you
probably want to add MX and other records as well.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Migrate domains to different DNS servers

2011-04-20 Thread Torinthiel

Dnia 2011-04-20 17:25 listus...@gmail.com  napisał(a):

>Hello all,
>
>We have a couple of BIND 8 DNS servers that we want to decommission,
>obviously we need to migrate the domains to other DNS servers first, which
>ordinarily involves zone transfer and domain re-delegation. However, we do
>not have control over a lot of the domains (think hundreds) on the BIND 8
>servers, meaning we cannot re-delegate.

In what sense you don't have control?
I assume you don't have administrative access to the BIND8 boxes.
Do you have AXFR access to BIND8 boxes and/or do you have the zone files?
Do you have access to registrar, where you have registered your domains?
Also, important factor is whether the DNS for those domains are in-zone or 
out-zone
i.e. assume you have example.com. Are NS servers ns1.example.com (in-zone) 
or ns1.otherdomain.com (out-zone)

One important problem is data. If you don't have access to zones' contents 
(either via AXFR or having zone files) then how would you know what your new 
nameservers should respond?

Assuming you have data, here are your options for delegation

If you have access to registrar, you can freely change the servers domain is 
delegated to, so you can simply change that delegation. i.e. domain was 
delegated to ns1.domain.com, now is to ns3.domain.com or ns1.newdomain.com
In case of out-zone nameservers that's only a name change. In case of 
in-zone nameservers, it's either name and IP address change, or only IP 
address change.

If you don't have registrar access, you have out-zone nameservers and you 
control (can change RR in) the zone that nameservers are, you can change the 
A/ records for NS, which will be a variation of your idea.
If you don't have registrar access and either you have in-zone nameservers, 
or can't control A/ records of out-zone nameservers, than AFAIK you're 
out of luck.

>A desperate measure (if you want to call it) is to transfer the zones to 
the
>new DNS infrastructure then change the A record of the old DNS to use the 
IP
>address of the new DNS. Effectively the old DNS becomes an alias of the new
>DNS.

Possible problem: glue records. With internal NS and no access to registrar 
you have no way to update glue records, so domain will still be delegated to 
old servers.
Regards,
 Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: the valid content of TXT RR

2011-04-21 Thread Torinthiel
On 04/22/11 04:49, Doug wrote:
> 2011/4/21 Mark Andrews :
>>
>> In message , Doug writes:
>>> Hello,
>>>
>>> what characters can or can't be included in a TXT record for DNS?
>>>
>>> Thanks.
>>
>> Named supports 8 bit data using the same presentation encoding as domain
>> names.
>>
> 
> 
> Thanks mark.
> But I meant what text string is permitted or not permitted in a TXT record.

There are no specific constraints on TXT record. It's free form text, so
you can specify 'blalasurawer vwa3ku4rygwli avwiruy' as well as 'do not
use' or spf syntax or anything.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: shared KSK for static zone and dynamic subzone?

2011-04-26 Thread Torinthiel
On 04/27/11 05:40, /dev/rob0 wrote:
> On Tue, Apr 26, 2011 at 10:15:18AM +0100, Phil Mayers wrote:
>> On 04/26/2011 02:13 AM, /dev/rob0 wrote:
>>> Is there any
>>> reason why I can't use the parent zone's KSK for the dynamic
>>> zone? Better yet, is there a reason why I shouldn't?
>>
>> Better yet, why *would* you? Keys aren't exactly expensive to 
>> generate.
> 
> Again, the $SUBJECT problem is resolved, but I have come upon a 
> possible reason to reuse a key.
> 
> I'm setting up a private namespace (RFC 1918 networks and imaginary 
> domain names) named+dhcpd system with three static zones, a dynamic 
> forward zone, and two dynamic reverse zones. Six total.
> 
> I want all these zones to be signed. Why? No good reason, just a
> learning exercise, actually. "Because I can."

That's a very good reason.


> [...]
>
> So that's what I'm going to do. Two more zones, four more keys, but 
> only two in trusted-keys. Tolerable.

You have some other options as well. First, as you've noticed, only the
top zone in the chain needs to have keys configured, all zones below can
benefit from DS records.
Second, if your zones are public, you can add your key to dlv.isc.org,
and only have to configure one key (which is build in into bind BTW).

Third, you can create your own DLV, and still use one key even with
private zones. Downside is that BIND cannot use two DLV repositories, so
you won't benefit from a lot of DLV configured zones. And I don't know
of a sensible way to duplicate ISC DLV and add some more keys.

You could download zones from http://secspider.cs.ucla.edu/ add your own
keys and sign by your own key. But keep in mind, that while ISC DLV asks
admins to configure their zones and verifies that they have keys and
abilities to modify zone, secspider simply walks everything (but from
several points around the world), so it's probably less secure.


> 
>> Anyway, the answer is "not really". The keys that bind generates
>> include the zone name, and you can't easily use a key whose name
>> != zone, and certainly not whose name is in a different zone.
>>
>> You're just complicating your life to no benefit. Use a different 
>> key for the child.
> 
> I'm a bit late to the DNSSEC party, what with the signed root being 
> in place already, but ISTM that these trusted-keys could be a major 
> management problem. Am I wrong? Is it still a problem?

Yes, but there are several possibilities to solve it.
First note that root is already signed, but not all (not even most) TLDs
are signed/accept DS records for delegations. So eg in .pl you are no
better than if root was not signed.

Ways to circumvent this include:
1) have your key distributed widely. Worst IMHO option, as it requires a
good distribution chain both at start, and when you change your KSK.

2) DLV - from DNS point of view it's a simple zone with a bit different
record types. If you have dlv.net, and want to check if example.com is
correclty signed, than your resolver asks for example.com.dlv.net, of
type DLV and if it receives correct answer (this implies that first you
trust DLV's key) it behaves just as if it got example.com's DS record
from .com. You still have to maintain key, but only one.

3) RFC 5011 specifies how keys can authenticate themselves, thus
simplifying KSK rollover.

Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Panic Time! Key Generation Question

2011-04-26 Thread Torinthiel
On 04/27/11 07:52, Martin McCormick wrote:
> I changed our tsig key and broke the world. Actually, the DNS's
> are happy. DHCP appears to be happy, but I am generating bad
> keys.
> 
> I wrote a script as follows:
> 
> #! /bin/sh
> /usr/local/sbin/dnssec-keygen -a hmac-md5 -b 512 -n HOST keyname
> 
> It produced a beautiful-looking key that bind was happy with in
> named.conf. Rndc worked after changing it there so I installed
> it in our production DNS's.
> 
>   Then the fun started. I put it in dhcpd and it broke
> because there was at least one blank in the string.
> 
>   After googling a bit, I used all after the blank. This
> made bind happy, still and dhcp worked but the original key no
> longer works so we can't do any manual dynamic updates until I
> install a key that actually works.
> 
>   Everything I read says to generate the key in pretty
> much this manner so how can I get one that works everywhere
> without white spaces that will blow up dhcpd?
> 
> I guess I was lucky before that there wre no spaces in the
> previous key.

Try deleting the space. Just this. dnssec-keygen inserts space for
readability purposes only. If you still have original *.key and
*.private files, you can check it yourself, that the Key field in
*private contains exactly the same as *.key, minus the space.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: AXFR/IN' denied

2011-04-27 Thread Torinthiel
On 04/28/11 05:10, jeffrey j donovan wrote:
> Greetings
> 
> I have 2 systems master and slave, the slave seems to not allow the zone 
> transfer.

It's the master that doesn't allow zone transfer. You have
allow-transfer and allow-update in mydomain.com (which I guess is
transfering correctly, at least nothing you've written says otherwise),
but you don't have these in reverse zones.
Torinthiel

> 
> master 192.168.1.2
> 
> //
> // mydomain.com
> 
> zone "mydomain.com" {
>   type master;
>   file "domain.db";
>   allow-transfer { 192.168.96.3; };
>   allow-update {none;};
> };
> 
> zone "96.168.192.in-addr.arpa" {
>   type master;
>   file "in-arpa-192/REV-NOC.db";
> };
> 
> zone "97.168.192.in-addr.arpa" {
>   type master;
>   file "in-arpa-192/REV-EDC.db";
> };
> 
> 
> slave; 192.168.1.3
> 
> //
> // mydomain.com
> 
> zone "mydomain.com" {
>   type slave;
>   masters { 192.168.96.2; };
>   file "domain.db";
>   allow-transfer {none;};
> };
> 
> zone "96.168.192.in-addr.arpa" {
>   type slave;
>   masters { 192.168.96.2; };
>   file "in-arpa-209/REV-NOC.db";
> };
> 
> zone "97.168.192.in-addr.arpa" {
>   type slave;
>   masters { 209.96.96.2; };
>   file "in-arpa-209/REV-EDC.db";
> };
> 
> 
> here is the log output
> 
> from master
> -Apr-2011 22:54:17.539 security: error: client 192.168.96.3#60712: view 
> com.basd.DNS.public: zone transfer '96.168.192.in-addr.arpa/AXFR/IN' denied
> -Apr-2011 22:54:17.539 security: error: client 192.168.96.3#60737: view 
> com.basd.DNS.public: zone transfer '97.168.192.in-addr.arpa/AXFR/IN' denied
> 
> from slave
> 
> 
> 27-Apr-2011 22:57:23.039 general: info: zone 
> 96.168.192.in-addr.arpa/IN/com.basd.DNS.public: Transfer started.
> 27-Apr-2011 22:57:23.041 xfer-in: info: transfer of 
> '96.168.192.in-addr.arpa/IN/com.basd.DNS.public' from 192.168.96.2#53: 
> connected using 192.168.96.3#60755
> 27-Apr-2011 22:57:23.042 xfer-in: error: transfer of 
> '96.168.192.in-addr.arpa/IN/com.basd.DNS.public' from 192.168.96.2#53: failed 
> while receiving responses: REFUSED
> 27-Apr-2011 22:57:23.042 xfer-in: info: transfer of 
> '96.168.192.in-addr.arpa/IN/com.basd.DNS.public' from 192.168.96.2#53: 
> Transfer completed: 0 messages, 0 records, 0 bytes, 0.001 secs (0 bytes/sec)
> 
> 
> firewall on the slave is off and the master has an allow statement for dns
> 12310271101096192 allow tcp from any to any dst-port 53
> 12310  2124656  168384287 allow udp from any to any dst-port 53
> 
> 
> not sure what I missed , any insight would be helpful
> 
> -j
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users




signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: does authority named require the external name servers?

2011-05-02 Thread Torinthiel
On 05/02/11 09:16, Jeff Pang wrote:
> When I run the authority named on a linux/unix like system, but don't
> put the reachable public nameservers on /etc/resolv.conf.
> What will happen to the authority named? Will it work right?

Authority named never sends queries on it's own, only responds to
submitted queries. So it will work correctly, although you won't be able
to resolve anything from that box.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: does authority named require the external name servers?

2011-05-02 Thread Torinthiel
On 05/02/11 14:20, Jeff Pang wrote:
> 2011/5/2 Jeff Pang :
>> 2011/5/2 Torinthiel :
>>
>>> Authority named never sends queries on it's own, only responds to
>>> submitted queries.
>> Doesn't it execute iterative query from the root server?
>>
>> For example, given the nameserver is authority for abc.com.
>> And abc.com has two NS RRs:
>>
>> abc.com.IN   NS   ns1.def.com.
>> abc.com.IN   NS   ns2.def.com.
>>
>> def.com is authoritative resolved by other nameservers.
>>
>> If there is no correct nameserver list in /etc/resolv.conf, then this
>> named can't find ns1.def.com and ns2.def.com?
>>
As you've noticed below, named will be able to find it. But why should
it? First, if it's authorative for abc.com than it's probably one of
ns[12].def.com, and second, a response with only nameservers and without
their addresses is perfectly valid response. And not that unusual too.
BIND will not add glue records for nameservers in zones which it's not
authorative for. So in this example if said server is also authorative
for def.com, than it knows ns[12].def.com addresses without querying
root servers. If it is not, it won't add glue records no matter what.

> I think BIND will always have the ability to find all domain-names
> regardless there is valid  entires in /etc/resolv.conf or not, since
> BIND has the ability to execute iterative query from the root server,
> and root server list is built-in.
BIND will be. Rest of the system won't. Unless you ocnfigure BIND to
resolve recursive queries from localhost and put it in /etc/resolv.conf



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNSSEC submit of DLV vs DNSKEY records?

2011-05-05 Thread Torinthiel
On 05/05/11 22:47, dchilton+b...@bestmail.us wrote:
> "missed it by THAT much ...".  thx! relocating to bind-users.
> 
> On Thu, 05 May 2011 14:37 -0500, "/dev/rob0"  wrote:
>> FWIW I think you hit the wrong list. Did you mean bind-users@isc?
> 
> 
>> On Thu, May 05, 2011 at 12:25:27PM -0700, dchilton+b...@bestmail.us 
>>wrote:
>>> after signing my zones with 'dnssec-signzone', i 've got both 
>>>
>>>  dsset-domain.com
>>>  dlvset-domain.com
>>>
>>> containing DS- and DLV-records, respectively.
>>>
>>> i know i *can* submit the records to my registrar (DS records)
>>> and dlv.isc.org (DLV records), but should I do both?
>>>
>>> i'm not clear if these are redundant mechs for getting to a
>>> 'valid' DNSSEC state, or complementary.
>>>
>>> can anyone clarify -- both or just one? and if just one, which
>>> one?
>>
>> [I hope someone will correct me if I'm wrong.]
>>
>> My understanding: if the parent is signed, that is the only way a 
>> child zone can be validated, unless of course using trusted-keys. 
>> DLV is only done when the parent is unsigned.

DLV can be done anyway, but having a signed parent is better.

Consider this situation: you have signed parent, but not a chain to root
(i.e. an island of trust). This makes your zone unvalidabe to anyone
that doesn't trust that island. now, if you have a DLV record, than
anyone trusting it can also validate your zone. If, OTOH, one trusts
parent, then why should he bother checking DLV?

Having a signed parent won't stop anyone from lookng at DLV (signed !=
trusted).

Anyway, .com is now signed and if you can put DS in .com than putting it
in DLV as well is overkill.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Compromised BIND?

2011-05-31 Thread Torinthiel
On 05/31/11 20:38, Supersonic wrote:
> I have a BIND 9.8.0-P2 server instance running on a production server.
> My firewall is showing repeated attempts by named.exe to connect to IP
> addresses in foreign countries on ports , 6667 and 6669 - common IRC
> ports used by worms/trojans/zombies. Checking my named.exe file, it
> shows that it is unchanged from the installation source. Is this
> connection normal? Should I be allowing it?

Looks bad.
Guessing by named.exe you're running windows.
Try checking if it's the same named.exe that you think - I've seen worms
disguising themselves as same name only different folder, or as "named
.exe" with space appended to base name. Looks great if you have hidded
extensions, as it seems you have two files with name "named".
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNS is tainted

2011-06-07 Thread Torinthiel
On 06/08/11 05:09, Jeff Peng wrote:
> Hello,
> 
>>From the dig info below:
> 
> C:\dig>dig +nocmd www.nsbeta.info +noall +answer @ns1.google.com
> www.nsbeta.info.3497IN  CNAME   nsbeta.info.
> nsbeta.info.2434IN  A   74.117.232.204
> 
> C:\dig>dig +nocmd www.nsbeta.info +noall +answer @ns1.google.com
> www.nsbeta.info.3492IN  CNAME   nsbeta.info.
> nsbeta.info.2429IN  A   74.117.232.204
> 
> C:\dig>dig +nocmd www.nsbeta.info +noall +answer @ns1.google.com
> www.nsbeta.info.3486IN  CNAME   nsbeta.info.
> nsbeta.info.2423IN  A   74.117.232.204
> 
> 
> I think my office network's DNS is tainted. because:

What do you mean by 'your office DNS' if you're not asking anything in
your office? It looks rather like either someone in your office or your
ISP is intercepting DNS traffic and answering questions directly.
Probably dig without server would result in answers fitting in same
decreasing TTL.
This is bad, but I don't think you can do much to avoid it, except
complaining or creating some VPN tunnel. It's not however too bad,
unless you're either using TSIG and have locally configured keys, or
trying to debug some specific DNS problem. Answers go out and are
returned, that's most of what's expected from DNS.
Torinthiel


> 
> 1) ns1.google.com is authoritative nameserver only, which shouldn't answer 
> this query.
> 2) the TTL is decreased each time, if it's a real authority answer, the TTL 
> should be all the same.
> 
> And this is the full output of dig:
> 
> C:\dig>dig  www.nsbeta.info  @ns1.google.com
> 
> ; <<>> DiG 9.3.2 <<>> www.nsbeta.info @ns1.google.com
> ; (1 server found)
> ;; global options:  printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1183
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
> 
> ;; QUESTION SECTION:
> ;www.nsbeta.info.   IN  A
> 
> ;; ANSWER SECTION:
> www.nsbeta.info.3111IN  CNAME   nsbeta.info.
> nsbeta.info.2048IN  A   74.117.232.204
> 
> ;; Query time: 15 msec
> ;; SERVER: 216.239.32.10#53(216.239.32.10)
> ;; WHEN: Wed Jun 08 11:09:09 2011
> ;; MSG SIZE  rcvd: 74
> 
> 
> How to deal with  this case? Thanks.
> 
> Regards.
> 
> 
> FREE 3D EARTH SCREENSAVER - Watch the Earth right on your desktop!
> Check it out at http://www.inbox.com/earth
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users




signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: second nameserver with two IPs

2011-06-07 Thread Torinthiel
On 06/08/11 03:37, Jeff Peng wrote:
> Hello,
> 
> My second nameserver has tow IPs, for example,
> 
> 61.144.56.1
> 61.144.57.1
> (They are in different CIDRs.)
> 
> and my ns2.example.com was pointed to these two IPs.
> 
> Will this cause problems, for example, the duplicated notification or 
> zone-transfer?

Duplicated notifications - yes, unless you explicitly configure master
server not to send for one of these IPs. And I'm not sure it's worth the
effort. Duplicate zone transfers - I think no, but I'm not sure how will
bind handle it. probably the best method would be to try it out.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: about AUTHORITY SECTION

2011-07-06 Thread Torinthiel
On 07/07/11 04:56, pa...@laposte.net wrote:
> 
> Hello,
> 
> I got two different forms of AUTHORITY SECTION from the dig, for example,
> 
> $ dig mydots.net @ns7.dnsbed.com 
> 
> ; <<>> DiG 9.4.2-P2.1 <<>> mydots.net @ns7.dnsbed.com
> ;; global options: printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36520
> ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
> ;; WARNING: recursion requested but not available
> 
> ;; QUESTION SECTION:
> ;mydots.net. IN A
> 
> ;; AUTHORITY SECTION:
> mydots.net. 3600 IN SOA ns7.dnsbed.com. support.dnsbed.com. 6 10800 3600 
> 604800 3600

This one means that there's no such record. Your answer is empty. See,
you don't have answer section and RFCs state that authorative
nameservers should send SOA record in authority section if there's no data.

> 
> ;; Query time: 90 msec
> ;; SERVER: 58.22.107.162#53(58.22.107.162)
> ;; WHEN: Thu Jul 7 09:54:07 2011
> ;; MSG SIZE rcvd: 86
> 
> 
> 
> $ dig www.mydots.net @ns7.dnsbed.com
> 
> ; <<>> DiG 9.4.2-P2.1 <<>> www.mydots.net @ns7.dnsbed.com
> ;; global options: printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3327
> ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0
> ;; WARNING: recursion requested but not available
> 
> ;; QUESTION SECTION:
> ;www.mydots.net. IN A
> 
> ;; ANSWER SECTION:
> www.mydots.net. 900 IN A 61.144.56.101
> 
> ;; AUTHORITY SECTION:
> mydots.net. 3600 IN NS ns7.dnsbed.com.
> mydots.net. 3600 IN NS ns8.dnsbed.com.


And this one has correct answer, and the NS records are there just in
case - to notify you that you got your answer from authorative ns and
what other authorative ns'es are.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: SPF implementation schedule.

2011-07-12 Thread Torinthiel

On 2011-07-12 10:07, kalpesh varyani wrote:

Looking at zytrix and spf2 sites, it seems that SPF is yet to be
implemented at functional level. RFC4408 documentation suggests method
to implement SPF. However, I need to know if ISC is planning to provide
support for SPF at client and/or server side.
Will anyone from ISC like to comment?


I'm not from ISC as well, but as Eivind has already stated - BIND 
already supports EVERYTHING there is on DNS server/resolver side. It 
serves SPF records, allows to fetch them, and there's nothing more from 
DNS you can require. What remains is *mailserver's* side to query for 
said SPF records and act accordingly. And this does not belong to ISC, 
but to your mailserver's provider. Postfix can do this by external 
plugins, some others probably as well but I haven't tested it.

Regards,
 Torinthiel



On Mon, Jul 11, 2011 at 7:42 PM, Eivind Olsen mailto:eiv...@aminor.no>> wrote:

kalpesh varyani wrote:

 > Does ISC implement SPF for server or client side currently?
 > If yes, then where to get the libraries; if not then what is the
 > scheduled date/release for implementation?

I'm not ISC, and anything I say may be completely wrong. Ok, that's the
disclaimer done with...

BIND support for SPF extends as far as being allowed to put SPF records
into zones. As far as I know BIND does not have any libraries or
functions
to actually make much sense of the content of SPF records, which is what
I'm guessing you're really looking for.
Perhaps something like libspf (http://www.libspf2.org
<http://www.libspf2.org/>) is what you want?

Regards
Eivind Olsen


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: SPF implementation schedule.

2011-07-12 Thread Torinthiel

On 2011-07-12 11:07, almah...@ranksitt.net wrote:

Hi,

I have fallen in problem with my  dns server. Some times , some specific
domain can't resolve. From log report (/var/log/messages) i have given log
for that.


And what does this has in common with the thread you've replied to?


Jul 12 11:17:44 ns1 named[14948]: client 178.33.222.134#38772: query
(cache) 'rankstel.net/MX/IN' denied
Jul 12 11:17:45 ns1 named[14948]: client 212.204.41.82#44529: query
(cache) 'rankstel.net/MX/IN' denied
Jul 12 11:17:48 ns1 named[14948]: client 212.204.41.82#64402: query
(cache) 'rankstel.net/MX/IN' denied


Looks like rankstel.net is delegated to two nameservers
 (see dig ns rankstel.net @e.gtld-servers.net.):

ns1.ranksitt.net. (which refuses to answer for it) and
ns1.rankstel.net. (which times out).
So, rankkstel.net is broken, you cannot do anything with it.


Jul 12 11:17:49 ns1 named[14948]: client 69.73.138.12#55591: query (cache)
'era.com.bd/MX/IN' denied


And era.com.bd is delegated to ns2.ranksitt.net., ns1.ranksitt.net. and 
dns.bankasia.com.bd.
And I see three different answers from those servers. Only 
ns2.ranksitt.net seems to be configured correctly (But I haven't dig any 
deeper).


Note, I've not tested it deeply, so it might be wrong.

Regards,
 Torinthiel
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: master slave different site different resolution

2011-07-14 Thread Torinthiel

On 2011-07-14 11:53, Gabriele Gabriele wrote:

Ok, may be I was not so clear to explain..


for example I have in my Master work site the our webmail
"webmail.mydomain.com" that when Master work site in UP the resolution
is 1.1.1.1 but if the master go down in My slave work site, my slave dns
resolv "webmail.mydomain.com" with 1.1.1.1 but that site is down. So
it should resolv it with my backup/slave resolution 2.2.2.2


So, you have both DNS and HTTP servers on both 1.1.1.1 and 2.2.2.2?
And you want HTTP traffic to go to 1.1.1.1, except where it fails, than 
it should switch to 2.2.2.2?


First, you do realize that you need to thing of some way to synchronize 
those web servers. Second, if those are synchronized, why don't just put 
both IP addresses and have some weak load balancing?


If you really want IP to change when server fails, this is bad:
a) takes time to propagate - after failure you still have to wait TTL 
seconds before everyone uses new server.
b) puts more burden on your DNS servers and on clients, as you have to 
put short TTLs on those names
c) you have to develop a way to test for primary's site failure. And 
take care of false-positives.
d) you can't have normal master-slave setup, which leads to zone 
maintenance problems.


Regards,
 Torinthiel




 > Date: Thu, 14 Jul 2011 17:42:56 +0800
 > Subject: Re: master slave different site different resolution
 > From: short...@gmail.com
 > To: d_gabri...@hotmail.it
 > CC: bind-users@lists.isc.org
 >
 > 2011/7/14 Gabriele Gabriele :
 > > Dear lists,
 > >
 > > I have an issue to resolve about 2 dns server Master/Slave.
 > >
 > >
 > > The Master is positioned in a site with public ip 1.1.1.1 and all
the public
 > > dns resolutions point to 1.1.1.1
 > > the Slave is positioned in a site whit public ip 2.2.2.2 and
obviously all
 > > the public dns resolutions point to 1.1.1.1
 > >
 > >
 > > the problem born when my Master site go down, because the Slave should
 > > change the dns public resolution whit 2.2.2.2
 > > is it possible use bind for this?
 > >
 >
 >
 > Sorry my bad understanding for your statement.
 > But since you have two servers, two public IPs, why not just publish
 > these two as authority or cache only servers?
 >
 > Regards.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: authoritative server is not caching?

2011-07-19 Thread Torinthiel

On 2011-07-19 11:40, pa...@laposte.net wrote:


Hello,

I want to make sure that if the authoritative server won't cache

> anything even if the authoritative answer from itself? Coz I saw
> the book Pro DNS and BIND says: The (authoritative) name server
> does not cache.

Authoritative server cannot cache anser from itself. Cache is for 
answers a server has received from somewhere,  while authoritative 
answers come directly from zone data.

Torinthiel
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: rndc: 'addzone' failed: permission denied

2011-08-17 Thread Torinthiel

On 2011-08-17 15:24, Fredrik Poller wrote:

Hello,

I'm trying to use the new addzone feature in rndc, but all I get is the 
following error message:

# rndc addzone 'example.com in external { type slave; file "example.com"; 
masters { 192.168.142.133; }; };'
rndc: 'addzone' failed: permission denied

rndc is configured and works well with other commands.

The bind log file doesn't tell me anything, despite increasing the trace level, 
it only acknowledges that the request was received. Running rndc with -V 
doesn't reveal anything useful.

I've tried with and without views, I've tried to add both master and slave 
zones with different filenames (both relative and full path). Out of 
desperation I've also instituted some very liberal file permissions on 
everything named related, but no luck.


Do you use chroot jail? Maybe the paths are different, and that's why it 
fails. Also, does 'very liberal' mean a+rwX, or something else? Bind 
might be trying to write as a user you are not expecting.


Regards,
 Torinthiel
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Max number of views and performance.

2011-08-24 Thread Torinthiel
On 08/24/11 16:03, Chris Buxton wrote:
> Views are tested in order. The first view that matches (by match-*
> statements), wins. There is no default unless you create one as the last
> view, typically without any match-* statements -- the default is to
> match all requests.
> 
> 1 million views sounds to me like a recipe for disaster. The time to run
> through all of the match-clients statements would probably be excessive,
> and the memory requirements would likely be huge.

And one question remains: Why would anyone need such a setup.
Torinthiel



signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: [UNsolved] was: what does dig +trace do?

2011-09-01 Thread Torinthiel
On 09/01/11 17:56, Tom Schmitt wrote:
> 
> I found the cause of my problem (and a solution):
> 
> dig +trace actually has another behaviour than doing the trace manually step 
> by step with dig.
> 
> 
> For a trace, dig is asking for the NS-records, then for the IP-address of the 
> nameserver found and then go on asking this nameserver. Till the destination 
> is reached.
> 
> In my case, dig is asking for the nameservers of the root-zone and is getting 
> the answer:
> . IN NS root1
> . IN NS root2 
> etc
> 
> Next dig is asking for the A-record of root1. And here is the differrence:
> 
> If I do "dig root1" dig is asking exactly this, it is asking for the A-record 
> of root1. And of course I get the correct answer from named.
> 
> The +trace option does not do this!
> Instead, the +trace-option is using the searchsuffix in the resolv.conf and 
> is asking for root1.my.search.suffix. and NOT for root1.
> This is why the +trace option fails every time.
> 
> After deleting the searchsuffix in resolv.conf, dig +trace is working fine 
> without any error.
> 
> In my oppinion it's a bug that dig +trace behave in a differrent way than 
> doing the queries with dig one by one.

No, IMHO, it's a bug in your root zone.
Names without dot at end are relative. Change your root zone to say
. IN NS root1.
. IN NS root2.

(with dots appended) and you should be home.




signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: ZSK pre-publish

2011-10-03 Thread Torinthiel

On 2011-10-01 11:40, Matthew Seaman wrote:


The trick is to use dnssec-settime modify the dates built into your key
by dnssec-keygen.  Or equivalently to use dnssec-keygen with appropriate
flags to set the 'Activate' date (not to mention Inactive and Delete)
some time in the future.

So --- this key is active now:

% dnssec-settime -p all Kinfracaninophile.co.uk.+005+04664.private
Created: Sat Aug 13 07:40:28 2011
Publish: Sat Aug 13 07:40:28 2011
Activate: Sat Sep 10 07:40:28 2011
Revoke: UNSET
Inactive: Sat Oct  8 07:40:28 2011
Delete: Sat Oct  8 07:40:28 2011

but this key is only published and will activate in a week:

% dnssec-settime -p all Kinfracaninophile.co.uk.+005+44132.private
Created: Sat Sep 10 09:01:24 2011
Publish: Thu Jan  1 01:00:00 1970
Activate: Sat Oct  8 09:01:24 2011
Revoke: UNSET
Inactive: Sat Nov  5 08:01:24 2011
Delete: Sat Nov  5 08:01:24 2011

dnssec-signzone will grok all the built-in dates and do the right thing
when you sign the zone.


BTW, how does dnssec-signzone behave when you pass -s option? Does it 
take into account that date when determining whether to use/publish key? 
Can one for example generate signatures for the future using 
dnssec-signzone, or is it possible only with careful manual inclusion?

Regards,
 Torinthiel
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Resign a zone

2011-11-08 Thread Torinthiel

On 2011-11-08 10:34, rams wrote:

Hi ,
I have signed zone  and already i have resigned two times. Now again i
am resigning zone but after resign zone , RRSIG values are not changed.
the same old values displaying. Any wrong in me. Could you please guide
me how to change RRSIG values.


There could be several issues with this, please give some more info. How 
are you signing your zone? dnssec-signzone? automatically using bind? 
Some other software?


If you're using dnssec-signzone and pass it old signed zone data it 
regenerates signatures only if signature end time falls within a period 
defaulting to 1/4 signature valitity time (so with default signature 
period it's 7.5 days). If you re-sign your zone say 10 days in advance, 
it won't change old signatures. You can change it with -i. Other 
software probably behaves similarly.


Also, if you're signing your zone off-line and upload it to bind, did 
you remember to change SOA and reload master?

Regards,
 Torinthiel

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users