Re: Secondary and TLD not updating

2008-11-18 Thread Dawn Connelly
Hey, maybe it's time to agree to disagree on this one? If Bert and Ernie can
live together in roommate bliss, I'm sure we can all accept and appreciate
each others differences.

On Mon, Nov 17, 2008 at 7:47 PM, Kevin Darcy [EMAIL PROTECTED] wrote:

 [EMAIL PROTECTED] wrote:

 Just because individual records are public doesn't mean you should allow
 just anyone to configure their nameserver as a slave to your domain.
 There's no benefit to allowing transfers to just anybody except for the
 allowance it makes for the laziness of admins.


 Incorrect. I've often AXFR'ed people's zones to help troubleshoot problems
 they've reported.

 Weigh that against the  risks of DoS attacks, and the sucking up of
 previous upload bandwidth by domain transfers out.  Each such transfer could
 well use many many queries worth of bandwidth.

 Individual queries of every record in the zone consumes as much or even
 more bandwidth.

 Moreover, if a would-be hacker were to start *guessing* at names in the
 zone, then the total query traffic might actually be *substantially* larger
 than the zone transfer would be.

 (If Intrusion Detection/Prevention is in place, the hacker could fly under
 the radar horizon by spreading the queries over a moderately-long period of
 time, from different clients in a botnet, but the aggregate traffic might
 still be higher than an AXFR).

 Perhaps you don't understand that AXFRs are TCP. So reflection attacks
 aren't really an issue, and the usual concerns about
 DoS-amplification-via-reflector are misplaced.

 Admittedly, if one has exceptionally large RRsets in a given zone (e.g.
 using TXT RRs as a kind of _ad_hoc_ database), then allowing AXFRs might
 enable the hackers to find those RRsets and use them for amplification in
 subsequent DoS attacks. But the moral of that story is that one shouldn't
 use DNS as a generic distributed database, not that open AXFRs are
 inherently a security vulnerability.

 We never experienced any problems with having zone transfers completely
 open, for years. I realize that's just anecdotal evidence, but, on the other
 hand, are there any documented cases where open AXFRs were actually used in
 any kind of attack? If not, then I call FUD.


 Its one more potential vulnerability with no particular benefit.  Sounds
 like a poor trade to me.

 That's one opinion. I cited a particular benefit above. Another benefit
 is that maintaining lists of authorized slaves, potentially on a
 zone-by-zone basis, complicates named.conf and, as we all know, complicated
 configs lead to a higher risk of error, which can itself lead itself to
 security breaches.

 - Kevin

  --Original Message--
 From: Res
 Sender: [EMAIL PROTECTED]
 To: Jefferson Ogata
 Cc: bind-users@lists.isc.org
 Subject: Re: Secondary and TLD not updating
 Sent: Nov 17, 2008 4:20 PM

 On Mon, 17 Nov 2008, Jefferson Ogata wrote:



 On 2008-11-17 14:25, Holger Honert wrote:


 Chris Thompson schrieb:


 On Nov 17 2008, Res wrote:


 Ack! allow-transfer should never be any


 What, never? Why not?



 Security issue! You really want everyone to download your zone(s)?


 I couldn't care less. If the security of my systems were the least bit
 dependent on keeping DNS records secret, I would kinda suck as an admin,
 wouldn't I?




 does your employer know this is your attitude? he/she might take a
 different stand :) I know you'd no longer be working for me, if that was
 your take on how things should be.





 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users




-- 
Google for President
YouTube for VP
in any year divisible by 4
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: ISC launches new website and mailing list manager

2008-11-18 Thread Lars Hecking
 
 The mailing list conversion requires a little explanation:
 
 * The new one-stop page for all the lists under isc.org is
 https://lists.isc.org/mailman/listinfo
 
 Now, can it be configured to strip or reject html rubbish?


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Views and Blackhole

2008-11-18 Thread root net
Chris,

Thanks that worked.

RootNet08

On Tue, Nov 18, 2008 at 12:46 AM, Chris Buxton [EMAIL PROTECTED]wrote:

 Remove your subnet from the bogons ACL at the beginning.

 acl bogons {
 ! 192.168.16.0/21;
 0.0.0.0/8;
 [...]
 192.168.0.0/16;
 [...]
 };

 Chris Buxton
 Professional Services
 Men  Mice

 On Nov 17, 2008, at 8:38 PM, root net wrote:

 Hello,

 I have a server I am testing before I put in production.  Working on a more
 secure bind config.  BTW if anyone has any other suggestions on locking down
 bind beside below and chroot let me know.  I was adding views which has been
 debated time and time again whether or not it really helps but anyway.  My
 problem is I have the latest bogons from team-cymru which includes my
 internal network subnet 192.168.16.0/21.  So in the bogons list it says
 192.168.0.0/16 which is blackholed.  So my local network is being
 blackholed but it works fine when users not on the bogons query the server
 from the external view.  My question is how can I get this to work without
 adding each cidr block of the 192.168.0.0/16 separately or even breaking
 it up in /21s? I have tried everything I know how.  A sanitized portion of
 my named.conf is this:

 //For length sakes I took out the other networks.

 acl i_lan { 127.0.0.1; 192.168.16.0/21};
 acl i_dns { 127.0.0.1; 192.168.16.2; 192.168.23.2;};
 acl bogons { 0.0.0.0/8;
 1.0.0.0/8;
 2.0.0.0/8;
 5.0.0.0/8;
 192.168.0.0/16;
 198.18.0.0/15;
 223.0.0.0/8;
 224.0.0.0/3;
 };

 options {
   version Go Away;
   directory /var/named;
   dump-file /var/dump/named_dump.db;
   pid-file /var/run/named/named.pid;
   statistics-file /var/stats/named.stats;
   recursion no;
   allow-query { any; };
   listen-on { 127.0.0.1; 192.168.16.2;};
   recursive-clients 1000;
   tcp-clients 1000;
   auth-nxdomain yes;
   blackhole { bogons; };

 view internal {
   match-clients { i_lan; };
   notify no;
   recursion yes;
   allow-transfer { i_dns;};
 zone localhost {
   type master;
   file localhost.zone;
 };
 zone 127.in-addr.arpa {
   type master;
   file localhost.zone;
 };
 zone 0.in-addr.arpa {
   type master;
   file named.zero;
 };
 zone 255.in-addr.arpa {
   type master;
   file named.broadcast;

 // zones go here
 };

 view external {
   match-clients { !i_lan; any; } ;
   recursion no;
   allow-transfer { i_dns;};
 // zones go here
 };


 Any help is appreciated and thanks in advanced.

 RootNet08
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE: ISC launches new website and mailing list manager

2008-11-18 Thread Jeff Lightner
That reminds me of the debate over V chips/parental controls.  People
that DON'T want something think it is the responsibility of others not
to send it to them rather than THEIR own responsibility to block it with
the tools they have.

If you don't want HTML just set up a rule in your mail client that
blocks it.  If your mail client doesn't allow you to setup rules then
you probably need to use something created in the current millennium.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Lars Hecking
Sent: Tuesday, November 18, 2008 7:54 AM
To: bind-users@lists.isc.org; [EMAIL PROTECTED]
Subject: Re: ISC launches new website and mailing list manager


 
 The mailing list conversion requires a little explanation:
 
 * The new one-stop page for all the lists under isc.org is
 https://lists.isc.org/mailman/listinfo
 
 Now, can it be configured to strip or reject html rubbish?


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
--
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential 
information and is for the sole use of the intended recipient(s). If you are 
not the intended recipient, any disclosure, copying, distribution, or use of 
the contents of this information is prohibited and may be unlawful. If you have 
received this electronic transmission in error, please reply immediately to the 
sender that you have received the message in error, and delete it. Thank you.
--
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Reverse lookups failing

2008-11-18 Thread Davenport, Steve M
Please disregard. This is working now. Was either an ASA firewall dns
filter which was stopped and restarted during testing or the setting of
both nameservers to run bind9.3.5-P2.



From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Davenport, Steve
M
Sent: Monday, November 17, 2008 8:20 PM
To: [EMAIL PROTECTED]
Subject: Reverse lookups failing


Hello,
 
I am having issues with reverse lookups failing and can not find the
cause. Running bind 9.3.5-P1 and 9.3.6rc1.
On an external server dig gives:
 
$ dig @harley.mc.utmck.edu -x 165.6.6.27
;  DiG 9.5.0-P1  @harley.mc.utmck.edu -x 165.6.6.27
; (1 server found)
;; global options:  printcmd
;; connection timed out; no servers could be reached

 
Internally the same query is fine:
$ dig @harley.mc.utmck.edu -x 165.6.6.27
;  DiG 9.2.4  @harley.mc.utmck.edu -x 165.6.6.27
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 1952
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;27.6.6.165.in-addr.arpa.   IN  PTR
;; ANSWER SECTION:
27.6.6.165.in-addr.arpa. 21600  IN  PTR ns-2.hosp.utmck.edu.
;; AUTHORITY SECTION:
6.165.in-addr.arpa. 21600   IN  NS  ns-2.hosp.utmck.edu.
6.165.in-addr.arpa. 21600   IN  NS  harley.mc.utmck.edu.
;; ADDITIONAL SECTION:
ns-2.hosp.utmck.edu.21600   IN  A   165.6.6.27
harley.mc.utmck.edu.21600   IN  A   165.6.131.32
;; Query time: 18 msec
;; SERVER: 165.6.131.32#53(harley.mc.utmck.edu)
;; WHEN: Mon Nov 17 19:50:49 2008
;; MSG SIZE  rcvd: 144

The config file has allow query set on the reverse zone. This was
working earlier and I'm told there have been no network changes.
 
Does this appear to be a firewall issue? Is there anything else that
might help narrow down the problem?
 
Thanks for your assistance,
Steve

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: bind9 no longer detect my ipv6 interface after having upgrade from ubuntu server 8.04 to 8.10

2008-11-18 Thread Adam Tkac
On Tue, Nov 18, 2008 at 04:13:35PM +0100, Thomas Manson wrote:
   Hi,

Hi,

  I've my secondary DNS Server that run bind9 version 9.5.0-P2 (from ubuntu
 8.10 server)
 
  Before, I was using the version on ubuntu 8.04 and it was working
 successfully with ipv6.
 

I think BIND from Ubuntu distribution is not compiled as GNU source
(with _GNU_SOURCE macro defined). It is needed to get IPv6 working.
The best solution is to open ticket in Ubuntu bug tracker.

Adam

-- 
Adam Tkac, Red Hat, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Zone does not show an A record when using Dig

2008-11-18 Thread Shawn Somers

It's resolving correctly from dnsstuff.com ...


Shawn Somers
Systems Administrator
Skynet BroadBand
(360)802-6657



Steve Koon wrote:


I have one of my zones that is not showing one of the A records when 
using Dig anyone know why this is happening?


 


*emailclickA  64.186.224.244*

 

 


Thanks,

Steve

 

 


=== Zone file content on secondary 

 


$ORIGIN .

$TTL 900   ; 15 minutes

discoversunriver.com  IN SOA ns1.escapia.com. nsadmin.escapia.com. (

2008111801 ; serial

10800  ; refresh 
(3 hours)


3600   ; retry (1 
hour)


86400  ; expire (1 
day)


86400  ; minimum 
(1 day)


)

NSns1.escapia.com.

NSns2.escapia.com.

NSpdns1.ultradns.net.

NSpdns2.ultradns.net.

A  69.25.129.10

MX1 aspmx.l.google.com.

MX5 alt1.aspmx.l.google.com.

MX5 alt2.aspmx.l.google.com.

MX10 aspmx2.googlemail.com.

MX10 aspmx3.googlemail.com.

MX10 aspmx4.googlemail.com.

MX10 aspmx5.googlemail.com.

TXT   v=spf1 
ip4:64.186.224.192/26 ip4:69.63.216.128/26 ip4:69.63.211.0/25 
ip4:69.25.129.6 ip4:72.18.155.106/29 a mx a:wezen.escapia.com 
include:aspmx.googlemail.com ~all


$ORIGIN discoversunriver.com.

emailclick  A  64.186.224.244

googlea4183689   CNAMEgoogle.com.

mail  CNAMEcrs.ultradns.net.

www A  69.25.129.10



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users