[Pdns-users] auth: Refuse ANY queries

2023-10-27 Thread Peter Thomassen via Pdns-users
Hi, On our pdns auth, we'd like to not serve ANY queries, not even over TCP. Ideally, we'd like to return NOTIMPL. In dnsdist, this is done with: addAction(QTypeRule(DNSQType.ANY), RCodeAction(DNSRCode.NOTIMP)) However, we've removed our dnsdist (for port 53; still in use for DoT), as we'v

Re: [Pdns-users] Blacklist domains

2023-10-24 Thread Peter Thomassen via Pdns-users
Hi Andrea, On 10/24/23 14:19, Andrea Biancalani via Pdns-users wrote: local postal police required to blacklist a list of domains. What kind of institution is that? Is this part of the Italian police? Thanks, Peter ___ Pdns-users mailing list Pdns-u

Re: [Pdns-users] SSHFP fingerprint size validation

2023-10-03 Thread Peter Thomassen via Pdns-users
Hi Atanas, On 10/3/23 18:56, atanas argirov via Pdns-users wrote: * testing malformed fingerprint size of (hash size +/- 2) is accepted with no complaints from both API and pdnsutil My question is: * is there any validation on the SSHFP fingerprint size based on the hash type? Apparently no

Re: [Pdns-users] IXFR Stability Feedback

2023-04-15 Thread Peter Thomassen via Pdns-users
Hi Klaus, On 4/15/23 22:09, Klaus Darilion via Pdns-users wrote: Hence, I would consider enabling IXFR for this zone, but until now I always tried to stay away from IXFR as there were always bugs in PDNS regarding IXFR, and according to the documentation removing of ENTs is not supported (does

Re: [Pdns-users] Rcode 3 NXDOMAIN for existing CNAME

2023-03-25 Thread Peter Thomassen via Pdns-users
On 3/25/23 14:04, Christoph wrote: My understanding is that ACME is about whether there is a TXT RRset with the challenge record; if it is not there, it's irrelevant whether the outcome is NXDOMAIN or NODATA/NOERROR. OK, now I understand where the misunderstanding comes from. Thanks for e

Re: [Pdns-users] Rcode 3 NXDOMAIN for existing CNAME

2023-03-25 Thread Peter Thomassen via Pdns-users
On 3/25/23 11:44, Christoph wrote: >> However, I doubt this is a reasonable approach for your ACME >> client. Sounds like a simple enough solution to me, can you elaborate why you doubt it is reasonable? My understanding is that ACME is about whether there is a TXT RRset with the challen

Re: [Pdns-users] Rcode 3 NXDOMAIN for existing CNAME

2023-03-21 Thread Peter Thomassen via Pdns-users
On 3/13/23 11:41, Chris Hofstaedtler | Deduktiva via Pdns-users wrote: * Christoph [230312 19:52]: When there is an xNAME chain, the RCODE field is set as follows: When an xNAME chain is followed, all but the last query cycle necessarily had no error. The RCODE in the ulti

Re: [Pdns-users] trying to understand pdns and dnssec

2017-11-08 Thread Peter Thomassen
ious Thursday until the Thursday two weeks later. This two-week interval > jumps with one-week increments every Thursday. Stay secure, Peter -- OpenPGP Fingerprint: 7963 D427 FD32 AC6F D20F D0B1 EFD6 143A 3EF2 2D2F deSEC https://desec.io/ Vertreten durch: Dr. Peter Thomassen, Nils Wisiol sig

Re: [Pdns-users] Possible Bug on Authoritative server 4.0.3

2017-06-20 Thread Peter Thomassen
; > > ___ > Pdns-users mailing list > Pdns-users@mailman.powerdns.com > https://mailman.powerdns.com/mailman/listinfo/pdns-users > -- OpenPGP Fingerprint: 7963 D427 FD32 AC6F D20F D0B1 EFD6 143A 3EF2 2D2F Verwir

Re: [Pdns-users] PowerDNS API and RFC in relation to CNAMEs

2017-06-14 Thread Peter Thomassen
On 06/14/2017 09:50 AM, Peter Thomassen wrote: > Caveat: NSEC3 (and probably also NSEC) records do reveal the presence of > the other records in the database. I think this is a bug -- I'm going to > open an issue on github. for reference: https://github.com/PowerDNS/pd

Re: [Pdns-users] PowerDNS API and RFC in relation to CNAMEs

2017-06-14 Thread Peter Thomassen
/help/email-openpgp.html deSEC Maybachufer 9 12047 Berlin Germany phone: +49-30-47384344 Vertreten durch: Dr. Peter Thomassen, Nils Wisiol signature.asc Description: OpenPGP digital signature ___ Pdns-users mailing list Pdns-users@mailman.powerdns.com

Re: [Pdns-users] Inconsistent wildcard behaviour with and without DNSSEC

2016-09-09 Thread Peter Thomassen
Hi Pieter, On 09/09/2016 07:20 AM, Pieter Lexis wrote: >> *.example.com. IN A 1.2.3.4 >> a.example.com. IN A 2.3.4.5 >> >> Then, without DNSSEC enabled, asking for the A record of b.a.example.com >> gives 1.2.3.4. However, with DNSSEC enable, the result is NXDOMAIN. >> >> So,

Re: [Pdns-users] Serve presigned auth-zones with pdns-recursor

2016-09-09 Thread Peter Thomassen
Hi Pieter, On 09/09/2016 07:00 AM, Pieter Lexis wrote: >> I set up a the recursor (4.0.3) with a separate zone file that I >> declared authoritative using the auth-zones directive. The zone file >> contains DNSSEC signatures. >> >> However, when querying the recursor using dig +dnssec, only the >>

[Pdns-users] Inconsistent wildcard behaviour with and without DNSSEC

2016-09-08 Thread Peter Thomassen
Hi, I noticed the following inconsistency in the authoritative server, and I would like to know if it is intended. (I was not unable to figure this out by looking up the RFCs.) Let's say we have *.example.com. IN A 1.2.3.4 a.example.com. IN A 2.3.4.5 Then, without DNSSEC enabled, as

[Pdns-users] Forward queries for non-existent records to hidden master (NSEC3 narrow)

2016-09-08 Thread Peter Thomassen
Hi all, I would like to set up frontend nameservers in various locations which have copies of my zone files (i.e., slaves). I would like the zones to be pre-signed, but use NSEC3 in narrow mode at the same time. NSEC3 narrow requires live signing of replies. However, I would like to avoid having

[Pdns-users] Serve presigned auth-zones with pdns-recursor

2016-09-08 Thread Peter Thomassen
Hi, I set up a the recursor (4.0.3) with a separate zone file that I declared authoritative using the auth-zones directive. The zone file contains DNSSEC signatures. However, when querying the recursor using dig +dnssec, only the requested record types (e.g. A) are returned, but not the RRSIG rec

[Pdns-users] dead lock with rectify

2016-08-02 Thread Peter Thomassen
Hi, I recently run pdnsutil rectify-zone, with the pdns 4.0.0~alpha2 version that comes with Ubuntu 16.04. I am using the MySQL background, and got a deadlock: Error: GSQLBackend unable to update ordername and auth for domain_id 3390: Could not execute mysql statement: update records set ordernam

Re: [Pdns-users] Modifying DNS Response

2015-09-21 Thread Peter Thomassen
Hi Klaus, On 09/21/2015 04:11 PM, Klaus Darilion wrote: > With Anycast it works from the beginning, but is not always correct (BGP > is optimized for cheapest routing, not for most efficient routing). Any > if it is to expensive for you to build an Anycast network, just host > your domains with so

[Pdns-users] Hooks to run external scripts?

2015-06-05 Thread Peter Thomassen
Dear PowerDNS people, Are there any hooks in PowerDNS to run scripts after certain API calls have been processed? Since I could not find this in the documentation, I assume the chances are low, but I still thought it's worth asking. For example, after adding a zone, I would like to turn on DNSSEC

Re: [Pdns-users] DNSSEC trouble

2015-05-20 Thread Peter Thomassen
Hi Pieter, On 05/20/2015 01:42 PM, Pieter Lexis wrote: > On 05/20/2015 01:31 PM, Peter Thomassen wrote: >> Yes, I saw that. However, I am using PowerDNS 3.3 on the slaves, so that >> can't be it ... > > Is the zone on the slave set to pre-signed? If not, PowerDNS ig

Re: [Pdns-users] DNSSEC trouble

2015-05-20 Thread Peter Thomassen
Hi Leen, On 05/20/2015 12:32 PM, Leen Besselink wrote: >> # these failed: >> dig @ns1.desec.io +dnssec +norec desec.io DNSKEY >> dig @ns1.desec.io +dnssec +norec desec.io A >> >> Here is a working example with an RRSIG for the DNSKEY query: [...] > As we can see, no RRSIG-record on your domain, my

Re: [Pdns-users] DNSSEC trouble

2015-05-20 Thread Peter Thomassen
Hi Leen, Thank you for your quick reply! On 05/20/2015 12:39 PM, Leen Besselink wrote: > Just had a quick look at the docs. What version are you running ? Did you see > this ?: > > "When using slaves that AXFR your signed zones, be sure that your slaves > actually support serving DNSSEC. Some

[Pdns-users] DNSSEC trouble

2015-05-20 Thread Peter Thomassen
Dear experts, I'm sorry to bug you again, but I am still stuck with deploying DNSSEC for desec.io, and I'd like to ask for your help once more. I have a hidden primary which does the signing in live mode (MySQL backend), and two public nameservers ns1.desec.io and ns2.desec.io which receive the z

Re: [Pdns-users] DS record: Algorithm and data inconsistent?

2015-05-19 Thread Peter Thomassen
Hi Pieter, On 05/19/2015 08:04 PM, Pieter Lexis wrote: >> # pdnssec show-zone desec.io > > I tested you DNSKEY record using ldns-key2ds and get exactly the same > results for every algorithm. I would advise you to open a ticket with > nic.io. > > It might also be that they simply don't accept GO

[Pdns-users] Best way of replication

2015-05-19 Thread Peter Thomassen
Hi, I am running a hidden primary and two slaves which are exposed to the public. I would like to use DNSSEC, and keep the private keys on the hidden primary. I'm using the MySQL backend. As far as I know, there are two (or more?) ways to set up replication: - AXFR-based. In this case, private k

[Pdns-users] DS record: Algorithm and data inconsistent?

2015-05-19 Thread Peter Thomassen
Hi, I am trying to publish DS records for desec.io with the .io registry. Upon entering the DS records in their web interface, I get the following error: > The Algorithm and data do not match in your DS record I am surprised, because the records are from pdnssec show-zone: # pdnssec show-zone d

Re: [Pdns-users] recursing for records which are missing from authoritative zones

2015-04-29 Thread Peter Thomassen
Hi Ken, On 04/29/2015 02:50 PM, k...@rice.edu wrote: > On Wed, Apr 29, 2015 at 11:26:41AM +0300, Kiki wrote: >> Thanks for the info. I'm stull confused about the meaning of "for questions >> for which there is no answer", in the following paragraph: >> >> This means that for questions for which th

[Pdns-users] Unterstanding slave logs

2015-04-11 Thread Peter Thomassen
Hi, My PowerDNS slave log file often shows lines like the following: 17 slave domains need checking, 0 queued for AXFR Received serial number updates for 16 zones, had 1 timeouts Domain 'example.com' is fresh (not presigned, no RRSIG check) [there are 16 lines like the last one] I am not sure if