Re: EDNS Compliance

2019-01-18 Thread Crist Clark
In SRX speak: # set security alg dns disable To verify status of DNS and other ALGs: show security alg status The DNS ALG is one of those enabled by default and must be explicitly disabled to turn it off. On Fri, Jan 18, 2019 at 1:14 PM N. Max Pierson wrote: > The 2 servers that pass th

Re: EDNS Compliance

2019-01-18 Thread N. Max Pierson
The 2 servers that pass the check are behind an old Cisco FWSM so I know it at least works. Hopefully that code carried over to the ASA and won't give us any problems but if it does, I have the option of moving these servers directly to the internet and I can configure iptables for any filtering we

Re: EDNS Compliance

2019-01-18 Thread Mark Andrews
I can’t remember if Cisco ASA has a similar issue. Checkpoint does have similar issues (EDNS version != 0 and EDNS flags) last time I checked. Checkpoint were thinking of changing the defaults. You just need to turn off the setting on the Juniper. It really shouldn’t be on by default as it does

Re: DNS flag day

2019-01-18 Thread Mark Andrews
> On 19 Jan 2019, at 6:58 am, Ben Croswell wrote: > > I would say we had one provider go as far as saying this whole flag day thing > is a hoax. Not sure what option there is other than voting with your wallet > and moving to a different provider. You can go read the source code and see wher

Re: DNS flag day

2019-01-18 Thread Warren Kumari
On Fri, Jan 18, 2019 at 3:28 PM Ben Croswell wrote: > I would imagine "its a hoax" is code for we dont want to bother > remediating. > > yah, I get their "Don't want to do it" position, but "It's a hoax" seems like a poor selection from the possible excuses -- when flag day occurs it will be clea

Re: EDNS Compliance

2019-01-18 Thread N. Max Pierson
I was just trying to figure out how I could log this but since the logging would only probably show if something didn't match udp 53 on the server IP it probably wouldn't match the block-any catch-all log I configured. I will certainly bring this up to our Juniper rep but in the meantime, I have a

Re: EDNS Compliance

2019-01-18 Thread Mark Andrews
This is the signature of a Juniper firewall which drops EDNS version != 0 and packet with a NSID option present. Dropping EDNS version != 0 just breaks future interoperability and as already impacted of EDNS development as the RFC 6891 would have included a EDNS version bump except for these stupi

Re: DNS flag day

2019-01-18 Thread Ben Croswell
I would imagine "its a hoax" is code for we dont want to bother remediating. On Fri, Jan 18, 2019, 3:20 PM Warren Kumari > > On Fri, Jan 18, 2019 at 2:58 PM Ben Croswell > wrote: > >> I would say we had one provider go as far as saying this whole flag day >> thing is a hoax. >> > > That's a weir

Re: DNS flag day

2019-01-18 Thread Warren Kumari
On Fri, Jan 18, 2019 at 2:58 PM Ben Croswell wrote: > I would say we had one provider go as far as saying this whole flag day > thing is a hoax. > That's a weird stance / position. "The whole flag day thing is [stupid|overblown|annoying|confusing|on a Friday]" are all positions I can understand

Re: DNS flag day

2019-01-18 Thread Ben Croswell
I would say we had one provider go as far as saying this whole flag day thing is a hoax. Not sure what option there is other than voting with your wallet and moving to a different provider. May even be worth looking at 2 providers. I see DNS provider redundancy as being a huge priority after the D

RE: DNS flag day

2019-01-18 Thread Lightner, Jeffrey
On checking I find that any of our domains that use Network Solutions’ Worldnic.com nameservers are reporting failures when checked. For example this result: https://ednscomp.isc.org/ednscomp/e30c6cf0ea Other people online have posted about Network Solutions as they also saw failures. On call

Re: EDNS Compliance

2019-01-18 Thread Warren Kumari
On Fri, Jan 18, 2019 at 12:07 PM Ben Croswell wrote: > As long as all 4 DNS servers are running the same version, my first > suggestion would be to check firewalls for dropped packets. > > Some FW/IPS drop packets with edns versions other 0 because they see it as > an attack. > This can be gener

Re: EDNS Compliance

2019-01-18 Thread N. Max Pierson
Good point as I did not think in terms of an IPS checking for that as well. In our case the firewall in question is acting as a simple packet filter so based on what you state, I should be able to allow for larger packet sizes for DNS queries and hopefully that will resolve our issues. Thank you f

Re: DNS flag day

2019-01-18 Thread Victoria Risk
> On Jan 18, 2019, at 9:18 AM, Ben Croswell wrote: > > I shouldn't have posted so closely to responding to the other user. Oh, my mistake. How is this for a definitve statement? BIND 9 was designed to be EDNS compliant from very beginning. All currently-supported branches of BIND 9 are EDNS

Re: EDNS Compliance

2019-01-18 Thread Ben Croswell
It more complicated than just packet size. I have seen FWs with IPS rules that were dropping the packets because the rule stated 0 was the only edns version and anything else was an attack. I would check the FW logs to find the log of the drop and work back from there. On Fri, Jan 18, 2019, 12:29

Re: EDNS Compliance

2019-01-18 Thread N. Max Pierson
Thanks to the response Ben. After looking at the results, it seems we do have a different firewall between the 4 servers and they have IPs out of the same subnet for 2 of them which are failing. So this lets me know it is firewall related and now I can check that. Do you know what type of rule (in

Re: DNS flag day

2019-01-18 Thread Ben Croswell
I shouldn't have posted so closely to responding to the other user. I am not running 9.8. I was replying to them about firewalls in regards to their 9.8 issues. Was just hoping for a statement of 9.x or greater supports the needed badvers signaling etc. On Fri, Jan 18, 2019, 12:15 PM Victoria Ri

Re: DNS flag day

2019-01-18 Thread Victoria Risk
> On Jan 18, 2019, at 9:09 AM, Ben Croswell wrote: > > Has ISC released minimum viable BIND version for flag day? Most versions of BIND authoritative servers, going back years, are EDNS compatible. Certainly ALL currently supported versions are compatible. I see you are running 9.8, which has

DNS flag day

2019-01-18 Thread Ben Croswell
Has ISC released minimum viable BIND version for flag day? I looked around and couldn't find anything. ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org htt

Re: EDNS Compliance

2019-01-18 Thread Ben Croswell
As long as all 4 DNS servers are running the same version, my first suggestion would be to check firewalls for dropped packets. Some FW/IPS drop packets with edns versions other 0 because they see it as an attack. On Fri, Jan 18, 2019, 12:02 PM N. Max Pierson Hi List, > > I am trying to ensure o

EDNS Compliance

2019-01-18 Thread N. Max Pierson
Hi List, I am trying to ensure our Bind servers comply with EDNS for the upcoming Flag Day (https://dnsflagday.net/). I am somewhat ignorant to EDNS but from what I have read, the information is somewhat conflicting as some documentation states EDNS is not a record that you configure in your zone

Bootstrap inline signing

2019-01-18 Thread Niels Haarbo via bind-users
Is it supported to bootstrap inline signing using dnssec-signzone?   $ named-compilezone -f text -F raw -o example.raw example.com example.text   $ dnssec-signzone -S -K /etc/bind/keys -O raw -3 ABCDEF -H 19 -A -o example.com -f example.raw.signed  example.text and then load the two files (