b

2010-03-29 Thread Nate Itkin
If someone would kindly explain what this error message means, I would 
appreciate it.  I'm running BIND 9.6.2-P1 and I get quite a few of these:

28-Mar-2010 21:02:27.467 dnssec: warning: client 200.160.7.134#6363: view 
external: expected covering NSEC3, got an exact match

Thank you,
Nate Itkin
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Matthew Pounsett

On 2010/03/28, at 18:48, Roy Badami wrote:

> configured).  The queries are resulting in SERVFAIL, and I'm pretty
> sure the failures are DNSSEC-related, as when I've seen problems as
> they occur (dig failing from the command line) then repeating the
> query with the CD bit allowed it to succeed.

It looks to me like your example, freebsd.org, is insecure.  

There are no DS records for freebsd.org in the org zone, so BIND can't follow 
the trust chain from the org.dlv.isc.org DLV record.

; <<>> DiG 9.6.0-APPLE-P2 <<>> +norec +dnssec IN DS freebsd.org 
@a0.org.afilias-nst.info
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52863
;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 6, ADDITIONAL: 1
[...]

There also appears to be no DLV record for freebsd.org:

; <<>> DiG 9.6.0-APPLE-P2 <<>> +norec +dnssec IN DLV freebsd.org.dlv.isc.org 
@ns.isc.afilias-nst.info
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23858
;; flags: qr aa; QUERY: 1, ANSWER: 0, AUTHORITY: 6, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;freebsd.org.dlv.isc.org.   IN  DLV

;; AUTHORITY SECTION:
dlv.isc.org.3600IN  SOA ns-int.isc.org. 
hostmaster.isc.org. 2010032802 7200 3600 2419200 3600
dlv.isc.org.3600IN  RRSIG   SOA 5 3 3600 20100427130003 
20100328130003 64263 dlv.isc.org. 
IbRdfwxFInY6FuHtsfVatqrNvMIoifQTrohzEZF1UsTx9XAowU1Zz57L 
YcHPu3ReAdYOL+IwkG8syNQ/LSLnpZY3K3Av/HSmPV524KWbm39J+k+G 
BMmIIsnvC4I40UUr7f/AXF14JgdAu9eokvvLvqR0CcAY0dq9HGHjdXC1 HbI=
flame.org.dlv.isc.org.  3600IN  NSEC863.freenum.org.dlv.isc.org. 
RRSIG NSEC DLV
flame.org.dlv.isc.org.  3600IN  RRSIG   NSEC 5 5 3600 20100427130003 
20100328130003 64263 dlv.isc.org. 
KZRZadIqTS8p6V3fRz7bsOrP3A/gTqJzeVtWTOqhrRbChLt0jVbhY4fR 
1pBogkhc84xcv7i0odHMzWCIpmQdv4Q/ODnophPdgrfPcxB93s3dMQ/D 
j0o2KTYsx1qJo0O1RWqhicUdwGoVYm5rZFLxy/uBV0dJe0KGrSmY21Gw U/c=
org.dlv.isc.org.3600IN  NSEC1mg.org.dlv.isc.org. RRSIG NSEC 
DLV
org.dlv.isc.org.3600IN  RRSIG   NSEC 5 4 3600 20100427130003 
20100328130003 64263 dlv.isc.org. 
YCe9L3iuJ5YD5hj7s1Z9wGsDkhLhqchNki+bSffHGxoYZVaQnMZXgWpS 
fYJZsFyJA3h1uEs5FvuLeLv1Poej2EhDyXucMHAgTJy4fbDjaw3Q8/MP 
et17Ki0TSNvMFdusCJl93aSZBnKponKR67ofvb8wwt5SDCYrR41EgvzE WZs=

;; Query time: 58 msec
;; SERVER: 199.254.63.254#53(199.254.63.254)
;; WHEN: Mon Mar 29 04:22:48 2010
;; MSG SIZE  rcvd: 721

Note both the NXDOMAIN status and the NSEC record covering 
flame.org.dlv.isc.org through 863.freenum.org.dlv.isc.org.  The NSEC record is 
used to prove that no domains which sort between those two names exist in the 
dlv.isc.org zone.

Just to make sure, I looked for RRSIGs in the freebsd.org zone, wondering if 
maybe the DLV record has simply disappeared from the dlv.isc.org zone somehow.. 
but it doesn't look like freebsd.org has been signed at all:

; <<>> DiG 9.6.0-APPLE-P2 <<>> +norec +dnssec IN  mx2.freebsd.org 
@ns2.isc-sns.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17599
;; flags: qr aa; QUERY: 1, ANSWER: 1, AUTHORITY: 3, ADDITIONAL: 11

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;mx2.freebsd.org.   IN  

;; ANSWER SECTION:
mx2.freebsd.org.3600IN  2001:4f8:fff6::35

Note the absence of an RRSIG in the ANSWER section.  If freebsd.org were 
signed, you'd expect to see an answer similar to this:

; <<>> DiG 9.6.0-APPLE-P2 <<>> +norec +dnssec IN  ns1.isc-sns.net 
@ns1.isc-sns.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 52801
;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 5

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;ns1.isc-sns.net.   IN  

;; ANSWER SECTION:
ns1.isc-sns.net.3600IN  2001:470:1a::1
ns1.isc-sns.net.3600IN  RRSIG    5 3 3600 2010042620 
2010032720 10377 isc-sns.net. 
qk8txlEYx6d8Mor155Rz0Te2vdQSPDoaJZM5FaXLfyNpruv7z3gdwtAI 
BrmDCKhzmyYni4GQmqZPYmceVjp1rcD17B5O+2/NET+obm3pcHKuzRZs 
e0PyP1LITahboUZzBoIyd7/jqs2+EwFKJgUs7v41UNp5oIz2vs0YuBo6 1Hc=


Have you checked the other domains you're having problems with to see that 
they're actually secured?
If you supply some info from your resolver configuration, someone here might be 
able to help debug the problem.

Matt
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


please explain error: expected covering NSEC3, got an exact match

2010-03-29 Thread Nate Itkin
Sorry about that truncated subject line. Let's try that again.

If someone would kindly explain what this error message means, I would
appreciate it.  I'm running BIND 9.6.2-P1 and I get quite a few of these:

28-Mar-2010 21:02:27.467 dnssec: warning: client 200.160.7.134#6363: view 
external: expected covering NSEC3, got an exact match

Thank you,
Nate Itkin

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


invalid requests for dns_registration.*

2010-03-29 Thread Matus UHLAR - fantomas
Hello,

on one of my nameservers I see many of these messages in log files:

Mar 29 07:59:07 gtssk1 named[5012]: security: error: client
195.168.29.200#65293: view gtsi: check-names failure
dns_registration.in.nextra.sk/A/IN

I'm curious of the reason because they are going to sevrer authoritative for
nextra.sk, but not for in.nextra.sk, so I think there's a broken DNS
resolver/updater somewhere.

Has anyone an idea what kind of devices or cofnigurations can issue these
requests?

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
The only substitute for good manners is fast reflexes. 
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Reasonable setup of a dnssec aware recursive resolver

2010-03-29 Thread Mark Elkins
I'm trying to come up with an interim solution for my ISP's DNS
Recursive Resolver that is DNSSEC aware.

My thoughts so far:-
Use BIND 9.6.1-P3 (this is the latest version named that Gentoo Linux
gives me).
In order to fetch both iTAR and DLV signatures - use a patched version
of WGET that is dnssec aware.

Once a week (is this frequent enough?) fetch the DNSSEC signatures from
iTAR and ISC/DLV, convert the iTAR xml stuff into Signatures, append the
DLV signature and then include this file into my named.conf
configuration.
(named.conf:   include "named.conf.trust-anchors"; )

In named.conf --> options, add:
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside . trust-anchor dlv.isc.org.;

This appears to be working for me.
Questions are - how frequently should one fetch these trust-anchors? I'd
have though once a week was enough but have read of situations where
people using ISC's DLV have had past problems.

I'm hoping that by using both iTAR and DLV - that I won't have this
problem - have not noticed anything personally yet.

I call this an "interim" solution - interim until the root is signed
with live data and contains the data that ITAR is currently being used
to store. I don't see ISC's DLV disappearing overnight just because the
root is signed either...

I'm only doing the 'wget-ting' from one location, then distributing
internally from there - in order to reduce loads.

What other suggestions do people have to achieve something similar?

ps - I find the CZ "DNSSEC Validator" (addon) plugin to Firefox very
inspiring! Anyone aware of something similar for IE?

-- 
  .  . ___. .__  Posix Systems - Sth Africa.  e.164 VOIP ready
 /| /|   / /__   m...@posix.co.za  -  Mark J Elkins, Cisco CCIE
/ |/ |ARK \_/ /__ LKINS  Tel: +27 12 807 0590  Cell: +27 82 601 0496


smime.p7s
Description: S/MIME cryptographic signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Roy Badami

> It looks to me like your example, freebsd.org, is insecure.  

Yes, I agree freebsd.org is insecure, but I still want to be able to
resolve it :-)

.org is signed with NSEC3 and (I think, but could be misremembering)
is using opt-out.  org is registered in DLV, so BIND still has to do
some work to verify that nothing is amiss with the (insecure)
delegation.  If it can't verify that it is correct for freebsd.org to
be insecure then it would be correct for it to fail resolution.

As I say the failures are intermittent - sometimes freebsd.org
resolves fine - sometimes it fails.

I don't think this is specific to freebsd.org, and problably not even
to .org - .org is just one of the higher-profile DNSSEC-signed TLDs.

   -roy
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Matthew Pounsett

On 2010/03/29, at 06:04, Roy Badami wrote:

> 
>> It looks to me like your example, freebsd.org, is insecure.  
> 
> Yes, I agree freebsd.org is insecure, but I still want to be able to
> resolve it :-)

The point was, you should not be getting DNSSEC-related errors from a domain 
that is not secured.  As requested, please supply configuration information... 
without that, it's unlikely anyone is going to be able to help you.

Matt
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: please explain error: expected covering NSEC3, got an exact match

2010-03-29 Thread Paul Wouters

On Sun, 28 Mar 2010, Nate Itkin wrote:


28-Mar-2010 21:02:27.467 dnssec: warning: client 200.160.7.134#6363: view 
external: expected covering NSEC3, got an exact match


The error suggests the following happened. The client asked for something
that did not exist. The server then hashes the hostname and looks at the
nsec3 hash that alphabetically covers that hashed hostname. However, it
found the hashed hostname *itself* in the list, indicating that the data
actuallly exists and should have been returned instead of an nsec3 hash
indicating the hostname did not exist.

I've seen these too, and I'm not sure where they come from. I hope it does
not indicate some kind of bug in the re-signing/re-using of old hashes with
a new zone in dnssec-signzone.

Paul
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Paul Wouters

On Mon, 29 Mar 2010, Matthew Pounsett wrote:


On 2010/03/28, at 18:48, Roy Badami wrote:


configured).  The queries are resulting in SERVFAIL, and I'm pretty
sure the failures are DNSSEC-related, as when I've seen problems as
they occur (dig failing from the command line) then repeating the
query with the CD bit allowed it to succeed.


It looks to me like your example, freebsd.org, is insecure.


I have seen this happen when bind for some reason (eg mtu issues with
vpn) cannot query for the DLV key at dlv.isc.org. I have not figured
out the exact failure mode there. Check the logs to see errors for DNSKEY
queries for dlv.isc.org to see if this is happening here too. However in
that case, no queries at all make it.

Paul
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Reverse DNS on a /27 delegation and zone files

2010-03-29 Thread Fr34k
Hello,

Sufficient resources on the Internet may be helpful.

For example, http://www.indelible.org/ink/classless/

Searching for "RFC2317" or "classless in-addr.arpa delegation" may result in 
additional references.

Hope this helps.


- Original Message 
From: Alex 
To: bind-users@lists.isc.org
Sent: Sun, March 28, 2010 9:52:38 PM
Subject: Re: Reverse DNS on a /27 delegation and zone files

Hi,

To follow up with my own email, I found a mistake that I made have corrected it.

> Do I also need to provide PTR records for these name servers? If so,
> how can I modify my reverse zone file to include that information? My

It seems I do need to provide PTR records. I confused the CNAMEs that
my provider creates with the PTRs that I create.

I'd still be interested in knowing:

> zone "0/27.yy.3.64.in-addr.arpa" {
>
> On a somewhat-related note, does bind-v9.4.2 support the '-' zone
> syntax notation? I was getting "bad data (check-names)" (from memory)

Was there a change between 9.4.2 and the current that provided the
ability to use the hypens versus the slash as a subnet separator?

Does anyone know if this format is documented well in O'Reilly's
DNS&BIND v5? Do you know up to what specific version it's applicable,
or perhaps even it's current?

Thanks again,
Alex
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Re: Delegation - what needs to be there?

2010-03-29 Thread Peter Laws

On 01/-10/37 13:59, Barry Margolin wrote:



Or do I need to provide glue records in the delegated zone ...  probably
not, but thought I'd better ask.


The only time you're required to provide glue is when a subzone is
delegated to a nameserver whose name is in the subzone, to prevent a
chicken-and-egg problem.



This is what I thought but thought I'd make doubly certain.  Thanks!

Peter

--
Peter Laws / N5UWY
National Weather Center / Network Operations Center
University of Oklahoma Information Technology
pl...@ou.edu
---
Feedback? Contact my director, Craig Cochell, cra...@ou.edu. Thank you!
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Roy Badami
> > Yes, I agree freebsd.org is insecure, but I still want to be able to
> > resolve it :-)
> 
> The point was, you should not be getting DNSSEC-related errors from
> a domain that is not secured.

I disagree.  In order for a validating resolver to resolve freebsd.org
(or any other insecure domain under .org) BIND still needs to verify
the RRSIG on the covering NSEC for freebsd.org.dlv.isc.org to prove
that freebsd.org doesn't have a DLV record.  It has to verify the
RRSIG on the DLV record for org.dlv.isc.org, and check that the hash
in the DLV record matches the DNSKEY record of the KSK at .org.  It
has to check that the RRSIG on the DNSKEY RRset is correctly signed
with the KSK, and then it has to check that the RRSIG on the NSEC3
opt-out record that covers freebsd.org is correctly signed with the
ZSK.  Only after doing all this does it know that freebsd.org is
really, legitimately, an insecure zone.

If any of these steps fail, the resolver should give an error, unless
the CD bit is set on the query.

> As requested, please supply configuration information... without
> that, it's unlikely anyone is going to be able to help you.  Matt

It's pretty basic.  Here's the substantive config - I've omited some
TSIG keys and a bunch of zones the server is authoritative for:



logging {
channel dnssec_log {
file "logs/dnssec.log" versions 2 size 2m;
print-time yes;
print-category yes;
print-severity yes;
severity debug 9;
};

category dnssec { dnssec_log; };
};

options {
directory   "/etc/namedb";
pid-file"/var/run/named/pid";
dump-file   "/var/dump/named_dump.db";
statistics-file "/var/stats/named.stats";


listen-on   { any; };
listen-on   port 5353 { any; };
listen-on-v6{ any; };

allow-recursion { any; };

dnssec-lookaside auto;

};

include "/etc/namedb/rndc.key";

controls {
inet 127.0.0.1 allow { localhost; } keys { rndc-key; };
};


zone "." {
type hint;
file "named.root";
};

zone "0.0.127.IN-ADDR.ARPA" {
type master;
file "master/localhost.rev";
};

// RFC 3152
zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA" 
{
type master;
file "master/localhost-v6.rev";
};


zone "google.com" {
type forward;
forwarders {
74.82.42.42;
};
};

zone "google.co.uk" {
type forward;
forwarders {
74.82.42.42;
};
};


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent failures resolving .org domains in BIND 9.7.0 with DLV enabled

2010-03-29 Thread Roy Badami
> I have seen this happen when bind for some reason (eg mtu issues with
> vpn) cannot query for the DLV key at dlv.isc.org. I have not figured
> out the exact failure mode there. Check the logs to see errors for DNSKEY
> queries for dlv.isc.org to see if this is happening here too. However in
> that case, no queries at all make it.

Hmm, I wonder whether it could be related to my tunnelled IPv6
connectivity.  I still don't see why, though.

Resolution definitely works sometimes.  When it starts failing
'rndc flush' has fixed it for me.

-roy
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Reasonable setup of a dnssec aware recursive resolver

2010-03-29 Thread Mark Elkins
On Mon, 2010-03-29 at 11:17 +0200, Mark Elkins wrote:
> I'm trying to come up with an interim solution for my ISP's DNS
> Recursive Resolver that is DNSSEC aware.
> 
> My thoughts so far:-
> Use BIND 9.6.1-P3 (this is the latest version named that Gentoo Linux
> gives me).

Ouch! - bitten by the signing of ARPA
 /etc/bind/named.conf.trust:225: configuring trusted key for 'ARPA.':
algorithm is unsupported.
-and- 
* No specific action is requested of operators. This message is
* for your information only.
* The ARPA zone is about to be signed using DNSSEC. The technical
* parameters by which ARPA will be signed are as follows: 
* KSK Algorithm and Size: 2048 bit RSA

I thought unrecognised algorithms were meant to be ignored?
Time to try Bind 9.7.0-P1 ??

> In order to fetch both iTAR and DLV signatures - use a patched version
> of WGET that is dnssec aware.
> 
> Once a week (is this frequent enough?) fetch the DNSSEC signatures from
> iTAR and ISC/DLV, convert the iTAR xml stuff into Signatures, append the
> DLV signature and then include this file into my named.conf
> configuration.
> (named.conf:   include "named.conf.trust-anchors"; )
> 
> In named.conf --> options, add:
> dnssec-enable yes;
> dnssec-validation yes;
> dnssec-lookaside . trust-anchor dlv.isc.org.;
> 
> This appears to be working for me.
> Questions are - how frequently should one fetch these trust-anchors? I'd
> have though once a week was enough but have read of situations where
> people using ISC's DLV have had past problems.
> 
> I'm hoping that by using both iTAR and DLV - that I won't have this
> problem - have not noticed anything personally yet.
> 
> I call this an "interim" solution - interim until the root is signed
> with live data and contains the data that ITAR is currently being used
> to store. I don't see ISC's DLV disappearing overnight just because the
> root is signed either...
> 
> I'm only doing the 'wget-ting' from one location, then distributing
> internally from there - in order to reduce loads.
> 
> What other suggestions do people have to achieve something similar?
> 
> ps - I find the CZ "DNSSEC Validator" (addon) plugin to Firefox very
> inspiring! Anyone aware of something similar for IE?
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
  .  . ___. .__  Posix Systems - Sth Africa.  e.164 VOIP ready
 /| /|   / /__   m...@posix.co.za  -  Mark J Elkins, Cisco CCIE
/ |/ |ARK \_/ /__ LKINS  Tel: +27 12 807 0590  Cell: +27 82 601 0496


smime.p7s
Description: S/MIME cryptographic signature
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Subdomain delegation only returns SOA on dig

2010-03-29 Thread Prabhat Rana

Hello all,
I'm running BIND 9.6.1-P1 on a Solaris box. This DNS (ns1.spx.net) is 
authoritative to domain spx.net (this is just example). And I'm trying to 
delegate nse.spx.net to ns1.nse.spx.net. I think I have configured correctly 
but when I run a dig from a different DNS node for a subdoamin within 
nse.spx.net like mil.nse.spx.net, it responds only SOA in the Auth section. Its 
missing the NS from the zone files. The snapshot of my named.conf file

zone "spx.net" {
type master;
file "/opt/named/db.spx.net";
};

zone "nse.spx.net" {
type master;
file "/opt/named/db.nse.spx.net";
};


Here are the snapshot of consecutive zone files
$ttl 38400
spx.net. IN  SOA ns1.spx.net. ns2.spx.net. (
1189784076
86400
3600
604800
38400 )
spx.net. IN  NS  ns1
spx.net. IN  NS  ns2
ns2.spxdns.net. IN  A   10.1.2.3
ns1.spxdns.net. IN  A   10.4.5.6
ns1.nse.spx.net. INA10.7.8.9
;there are other entries here
$ORIGIN nse.spx.net.
@  IN  NS  ns1.nse.spx.net.


And the 2nd zone file for submdomain nse.spx.net
$TTL 3600   ; 1 hour
@   IN SOA  ns1.nse.spx.net  (
2008081812 ; serial
1800   ; refresh (30 minutes)
900; retry (15 minutes)
604800 ; expire (1 week)
3600   ; minimum (1 hour)
)
;
nse.spx.net. IN  NS  ns1.nse.spx.net.
ns1.nse.spx.net.   IN  A   10.25.130.75


Now when I run a dig for say mml.nse.spx.net I get only the SOA of the above 
zone file and no NS information that the query is being delegated to.
#dig @ns1.spx.net mil.nse.spx.net
; <<>> DiG 9.6.1-P1 <<>> @ns1.spx.net mil.nse.spxdns.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1717
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;mil.nse.spxdns.net.IN  A

;; AUTHORITY SECTION:
nse.spx.net. 3600IN  SOA  ns1.nse.spx.net. 
2008081812 1800 900 604800 3600

;; Query time: 3 msec
;; SERVER: ns1.spx.net#53(10.1.2.3)
;; WHEN: Mon Mar 29 19:26:45 2010
;; MSG SIZE  rcvd: 108

How would the querying DNS find out about the nameserver that this subdomain is 
being delegated to? Why the query answer doesn't include NS sections. I've 
tried to change few things but nothing works. The only information I get is SOA 
and no NS in the AUTHORITY SECTION.

Any help would be much appreciated.

Thanks
Prabhat. 





  
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Subdomain delegation only returns SOA on dig

2010-03-29 Thread Kevin Darcy
The nameserver is recursive (RA in the header of the response means 
"Recursion Available"). It recursed to the nameservers of the child 
zone, which returned NXDOMAIN for the name mil.nse.spx.net, and it 
passed that answer back.


Everything is working the way it is supposed to, including your new 
delegation.


If you want to see a referral response from the same nameserver, try a 
non-recursive query, e.g. dig +norec, against an empty cache.



- Kevin


On 3/29/2010 3:34 PM, Prabhat Rana wrote:

Hello all,
I'm running BIND 9.6.1-P1 on a Solaris box. This DNS (ns1.spx.net) is 
authoritative to domain spx.net (this is just example). And I'm trying to 
delegate nse.spx.net to ns1.nse.spx.net. I think I have configured correctly 
but when I run a dig from a different DNS node for a subdoamin within 
nse.spx.net like mil.nse.spx.net, it responds only SOA in the Auth section. Its 
missing the NS from the zone files. The snapshot of my named.conf file

zone "spx.net" {
 type master;
 file "/opt/named/db.spx.net";
};

zone "nse.spx.net" {
 type master;
 file "/opt/named/db.nse.spx.net";
};


Here are the snapshot of consecutive zone files
$ttl 38400
spx.net. IN  SOA ns1.spx.net. ns2.spx.net. (
 1189784076
 86400
 3600
 604800
 38400 )
spx.net. IN  NS  ns1
spx.net. IN  NS  ns2
ns2.spxdns.net. IN  A   10.1.2.3
ns1.spxdns.net. IN  A   10.4.5.6
ns1.nse.spx.net. INA10.7.8.9
;there are other entries here
$ORIGIN nse.spx.net.
@  IN  NS  ns1.nse.spx.net.


And the 2nd zone file for submdomain nse.spx.net
$TTL 3600   ; 1 hour
@   IN SOA  ns1.nse.spx.net  (
 2008081812 ; serial
 1800   ; refresh (30 minutes)
 900; retry (15 minutes)
 604800 ; expire (1 week)
 3600   ; minimum (1 hour)
 )
;
nse.spx.net. IN  NS  ns1.nse.spx.net.
ns1.nse.spx.net.   IN  A   10.25.130.75


Now when I run a dig for say mml.nse.spx.net I get only the SOA of the above 
zone file and no NS information that the query is being delegated to.
#dig @ns1.spx.net mil.nse.spx.net
;<<>>  DiG 9.6.1-P1<<>>  @ns1.spx.net mil.nse.spxdns.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1717
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;mil.nse.spxdns.net.IN  A

;; AUTHORITY SECTION:
nse.spx.net. 3600IN  SOA  ns1.nse.spx.net. 
2008081812 1800 900 604800 3600

;; Query time: 3 msec
;; SERVER: ns1.spx.net#53(10.1.2.3)
;; WHEN: Mon Mar 29 19:26:45 2010
;; MSG SIZE  rcvd: 108

How would the querying DNS find out about the nameserver that this subdomain is 
being delegated to? Why the query answer doesn't include NS sections. I've 
tried to change few things but nothing works. The only information I get is SOA 
and no NS in the AUTHORITY SECTION.

Any help would be much appreciated.

Thanks
Prabhat.






___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users



   



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread chris liesfield
Seeing this after upgrading to 9.6.2-P1.

We've made no other changes to the host or any configuration files, etc.

/var/named # dnssec-signzone  -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au
dnssec-signzone: fatal: no self signed KSK's found

No idea what's going on here and we need advice on how to go about fixing it
ASAP.

Thanks.

Chris.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Reasonable setup of a dnssec aware recursive resolver

2010-03-29 Thread Mark Andrews

In message <1269885784.31597.68.ca...@mjenet.posix.co.za>, Mark Elkins writes:
> On Mon, 2010-03-29 at 11:17 +0200, Mark Elkins wrote:
> > I'm trying to come up with an interim solution for my ISP's DNS
> > Recursive Resolver that is DNSSEC aware.
> >=20
> > My thoughts so far:-
> > Use BIND 9.6.1-P3 (this is the latest version named that Gentoo Linux
> > gives me).

You want to have newer if you are using DNSSEC.

> Ouch! - bitten by the signing of ARPA
>  /etc/bind/named.conf.trust:225: configuring trusted key for 'ARPA.':
> algorithm is unsupported.
> -and-=20
> * No specific action is requested of operators. This message is
> * for your information only.
> * The ARPA zone is about to be signed using DNSSEC. The technical
> * parameters by which ARPA will be signed are as follows:=20
> * KSK Algorithm and Size: 2048 bit RSA
> 
> I thought unrecognised algorithms were meant to be ignored?

Just don't blindly import trust anchors.  Zone with unknown algorithms
will be treated as insecure when you transition to them from a
secure zone by following a delegation where all the DS records are
for unknown algorithms.  However when you add a trust anchor you
are saying treat this zone as secure and here are your starting
points.

> Time to try Bind 9.7.0-P1 ??

BIND 9.6.2-P1 and BIND 9.7.0-P1 both support RSASHA256 and RSASHA512.

> > In order to fetch both iTAR and DLV signatures - use a patched version
> > of WGET that is dnssec aware.
> >=20
> > Once a week (is this frequent enough?) fetch the DNSSEC signatures from
> > iTAR and ISC/DLV, convert the iTAR xml stuff into Signatures, append the
> > DLV signature and then include this file into my named.conf
> > configuration.
> > (named.conf:   include "named.conf.trust-anchors"; )
> >=20
> > In named.conf --> options, add:
> > dnssec-enable yes;
> > dnssec-validation yes;
> > dnssec-lookaside . trust-anchor dlv.isc.org.;
> >=20
> > This appears to be working for me.
> > Questions are - how frequently should one fetch these trust-anchors? I'd
> > have though once a week was enough but have read of situations where
> > people using ISC's DLV have had past problems.
> >=20
> > I'm hoping that by using both iTAR and DLV - that I won't have this
> > problem - have not noticed anything personally yet.

ITAR is already imported into DLV.  You really don't want to have lots
of trust anchors in named.conf.  Just more places to go wrong.  A the
root when it is signed however.

> >=20
> > I call this an "interim" solution - interim until the root is signed
> > with live data and contains the data that ITAR is currently being used
> > to store. I don't see ISC's DLV disappearing overnight just because the
> > root is signed either...
> >=20
> > I'm only doing the 'wget-ting' from one location, then distributing
> > internally from there - in order to reduce loads.
> >=20
> > What other suggestions do people have to achieve something similar?
> >=20
> > ps - I find the CZ "DNSSEC Validator" (addon) plugin to Firefox very
> > inspiring! Anyone aware of something similar for IE?
> >=20
> > ___
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
> --=20
>   .  . ___. .__  Posix Systems - Sth Africa.  e.164 VOIP ready
>  /| /|   / /__   m...@posix.co.za  -  Mark J Elkins, Cisco CCIE
> / |/ |ARK \_/ /__ LKINS  Tel: +27 12 807 0590  Cell: +27 82 601 0496
> 
> --=-zyQOFLsrjw8nMxXVg+CV
> Content-Type: application/x-pkcs7-signature; name="smime.p7s"
> Content-Disposition: attachment; filename="smime.p7s"
> Content-Transfer-Encoding: base64
> 
> MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIWfjCCB0gw
> ggYwoAMCAQICAgLSMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3Rh
> cnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4
> MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0Ew
> HhcNMDkxMDMxMDAwMDAxWhcNMTExMDMxMTU0MTEwWjCBujELMAkGA1UEBhMCWkExEDAOBgNVBAgT
> B0dhdXRlbmcxETAPBgNVBAcTCFByZXRvcmlhMSEwHwYDVQQKExhQb3NpeCBTeXN0ZW1zIChQVFkp
> IEx0ZC4xLTArBgNVBAsTJFN0YXJ0Q29tIFZlcmlmaWVkIENlcnRpZmljYXRlIE1lbWJlcjEUMBIG
> A1UEAxMLTWFyayBFbGtpbnMxHjAcBgkqhkiG9w0BCQEWD21qZUBwb3NpeC5jby56YTCCASIwDQYJ
> KoZIhvcNAQEBBQADggEPADCCAQoCggEBAL6KS+4WC5M29OOVGAcVUn/z90w4aoMidneOPY16Bnuo
> 6V+8C4kcZrVKoyIYRG55Uln2lKRHeSAhPNBTSMRkkQ1kGNSnmH5jCPhdL+VBN1+CAWeiPvblnsX+
> 5wOoEM6v/i2FdBcsdMmssYnG7WFhn4BsyFQe0bQgDNHgbbnJbSMFCaiqAICoQljL0ha/Z3SU+Dgz
> 2IKTo5fe8vN9P6z5QsETqeBgmsLET+MhwnQ8CRNYhq3vjrYqqie31COgE28Cn5+ez08MDnULB/5I
> cQFzZ5g1ORtaLrRg6VYHITnMn0EedOb9+iz/WF/nstqVwrKlJsp1hGsOeTjqCoOq6ASH3McCAwEA
> AaOCA4IwggN+MAkGA1UdEwQCMAAwCwYDVR0PBAQDAgSwMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggr
> BgEFBQcDBDAdBgNVHQ4EFgQUFPCcDnQQWUlHl8TRFshEBYXoA6IwgagGA1UdIwSBoDCBnYAUrlWD
> b+wxyrn3HfqvazHzyB3jrLuhgYGkfzB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20g
> THRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdG

Re: Subdomain delegation only returns SOA on dig

2010-03-29 Thread Prabhat Rana
Thanks for the response Kevin. However when I flush the cache and snoop the 
interface on this recursive DNS I don't see any request going to the nameserver 
(ns1.nse.spx.net) of the child zone. It appears it is just displaying the 
output it received from the ns1.spx.net nameserver. I don't have any port 53 
connectivity from ns1.spx.net to ns1.nse.spx.net. Would that cause any issues?


--- On Mon, 3/29/10, Kevin Darcy  wrote:

> From: Kevin Darcy 
> Subject: Re: Subdomain delegation only returns SOA on dig
> To: bind-users@lists.isc.org
> Date: Monday, March 29, 2010, 4:56 PM
> The nameserver is recursive (RA in
> the header of the response means 
> "Recursion Available"). It recursed to the nameservers of
> the child 
> zone, which returned NXDOMAIN for the name mil.nse.spx.net,
> and it 
> passed that answer back.
> 
> Everything is working the way it is supposed to, including
> your new 
> delegation.
> 
> If you want to see a referral response from the same
> nameserver, try a 
> non-recursive query, e.g. dig +norec, against an empty
> cache.
> 
>                
>                
>                
>                
>          
>                
>                
>                
>              -
> Kevin
> 
> On 3/29/2010 3:34 PM, Prabhat Rana wrote:
> > Hello all,
> > I'm running BIND 9.6.1-P1 on a Solaris box. This DNS
> (ns1.spx.net) is authoritative to domain spx.net (this is
> just example). And I'm trying to delegate nse.spx.net to
> ns1.nse.spx.net. I think I have configured correctly but
> when I run a dig from a different DNS node for a subdoamin
> within nse.spx.net like mil.nse.spx.net, it responds only
> SOA in the Auth section. Its missing the NS from the zone
> files. The snapshot of my named.conf file
> >
> > zone "spx.net" {
> >          type master;
> >          file
> "/opt/named/db.spx.net";
> > };
> >
> > zone "nse.spx.net" {
> >          type master;
> >          file
> "/opt/named/db.nse.spx.net";
> > };
> >
> >
> > Here are the snapshot of consecutive zone files
> > $ttl 38400
> > spx.net.     IN   
>   SOA     ns1.spx.net. ns2.spx.net.
> (
> >               
>           1189784076
> >               
>           86400
> >               
>           3600
> >               
>           604800
> >               
>           38400 )
> > spx.net.     IN   
>   NS      ns1
> > spx.net.     IN   
>   NS      ns2
> > ns2.spxdns.net. IN      A   
>    10.1.2.3
> > ns1.spxdns.net. IN      A   
>    10.4.5.6
> > ns1.nse.spx.net. IN        A 
>   10.7.8.9
> > ;there are other entries here
> > $ORIGIN nse.spx.net.
> > @      IN      NS 
>     ns1.nse.spx.net.
> >
> >
> > And the 2nd zone file for submdomain nse.spx.net
> > $TTL 3600       ; 1 hour
> > @             
>          IN SOA 
> ns1.nse.spx.net  (
> >               
>                
>   2008081812 ; serial
> >               
>                
>   1800       ; refresh (30
> minutes)
> >               
>                
>   900        ; retry (15 minutes)
> >               
>                
>   604800     ; expire (1 week)
> >               
>                
>   3600       ; minimum (1
> hour)
> >               
>                
>   )
> > ;
> > nse.spx.net.     
>    IN      NS   
>   ns1.nse.spx.net.
> > ns1.nse.spx.net.   IN   
>   A       10.25.130.75
> >
> >
> > Now when I run a dig for say mml.nse.spx.net I get
> only the SOA of the above zone file and no NS information
> that the query is being delegated to.
> > #dig @ns1.spx.net mil.nse.spx.net
> > ;<<>>  DiG
> 9.6.1-P1<<>>  @ns1.spx.net
> mil.nse.spxdns.net
> > ; (1 server found)
> > ;; global options: +cmd
> > ;; Got answer:
> > ;; ->>HEADER<<- opcode: QUERY, status:
> NXDOMAIN, id: 1717
> > ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY:
> 1, ADDITIONAL: 0
> >
> > ;; QUESTION SECTION:
> > ;mil.nse.spxdns.net.         
>   IN      A
> >
> > ;; AUTHORITY SECTION:
> > nse.spx.net.     
>    3600    IN     
> SOA  ns1.nse.spx.net    .
> 2008081812 1800 900 604800 3600
> >
> > ;; Query time: 3 msec
> > ;; SERVER: ns1.spx.net#53(10.1.2.3)
> > ;; WHEN: Mon Mar 29 19:26:45 2010
> > ;; MSG SIZE  rcvd: 108
> >
> > How would the querying DNS find out about the
> nameserver that this subdomain is being delegated to? Why
> the query answer doesn't include NS sections. I've tried to
> change few things but nothing works. The only information I
> get is SOA and no NS in the AUTHORITY SECTION.
> >
> > Any help would be much appreciated.
> >
> > Thanks
> > Prabhat.
> >
> >
> >
> >
> >
> >
> > ___
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
> >
> >
> >
> >    
> 
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
> 


  
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-us

Re: invalid requests for dns_registration.*

2010-03-29 Thread Barry Margolin
In article ,
 Matus UHLAR - fantomas  wrote:

> Hello,
> 
> on one of my nameservers I see many of these messages in log files:
> 
> Mar 29 07:59:07 gtssk1 named[5012]: security: error: client
> 195.168.29.200#65293: view gtsi: check-names failure
> dns_registration.in.nextra.sk/A/IN
> 
> I'm curious of the reason because they are going to sevrer authoritative for
> nextra.sk, but not for in.nextra.sk, so I think there's a broken DNS
> resolver/updater somewhere.

If the client doesn't have NS records cached for in.nextra.sk, it will 
ask the servers for nextra.sk, which should return a delegation.

> Has anyone an idea what kind of devices or cofnigurations can issue these
> requests?

Any properly functioning DNS resolver.  There's nothing wrong with the 
requests.  What's wrong is that your subdomain has a hostname with an 
underscore in its name.

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Nate Itkin
On Tue, Mar 30, 2010 at 12:39:58PM +1100, chris liesfield wrote:
> Seeing this after upgrading to 9.6.2-P1.
> We've made no other changes to the host or any configuration files, etc.
> /var/named # dnssec-signzone  -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au
> dnssec-signzone: fatal: no self signed KSK's found
> No idea what's going on here and we need advice on how to go about fixing it
> ASAP.
> Thanks.
> Chris.


9.6.2-P1 has worked ok for me [so far]. Two ideas that might yield more 
info for us to look at (increase v level as needed, but start with 1):

named-checkzone xxx.xxx.gov.au db.xxx.xxx.gov.au
dnssec-signzone -g -v 1 -o xxx.xxx.gov.au db.xxx.xxx.gov.au

Nate Itkin
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Nate Itkin
On Tue, Mar 30, 2010 at 01:50:23PM +1100, chris liesfield wrote:
> Here's the output ...
> /var/named # named-checkzone sro.vic.gov.au db.sro.vic.gov.au
> zone sro.vic.gov.au/IN: loaded serial 2010033001
> OK
> 
> I chose level 7 debugging to yield as much information as possible, so sorry
> for the size ...
> /var/named # dnssec-signzone -z -v 7 -g -o xxx.xxx.xxx.au db.xxx.xxx.xxx.au
> dnssec-signzone: using 2 cpus
> dnssec-signzone: debug 1: decrement_reference: delete from rbt: 81f2688
[ snip.. ]


Is there a key signing key (KSK) in the zone file?  db.xxx.xxx.xxx.au should 
have an entry something like this:
$include Kxxx.xxx.xxx.au.+007+12345.key   ; KSK

Does that file (Kxxx.xxx.xxx.au.+007+12345.key) and its corresponding 
private key (Kxxx.xxx.xxx.au.+007+12345.private) exist with read permission on? 

Also, how are you specifying which key is the KSK (typically the -k option
with dnssec-signzone)?

I can replicate your symptoms and the error message by removing the KSK from 
a zone file. 

Nate Itkin

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dnssec-signzone error after updating to 9.6.2-P1

2010-03-29 Thread Evan Hunt
> Seeing this after upgrading to 9.6.2-P1.
> 
> We've made no other changes to the host or any configuration files, etc.
> 
> /var/named # dnssec-signzone  -g -o xxx.xxx.gov.au db.xxx.xxx.gov.au
> dnssec-signzone: fatal: no self signed KSK's found

When dnssec-signzone has finished signing, it checks the zone for validity.
In this case, it found that the DNSKEY RRset didn't have any signatures
from a key-signing key.  This may be due to such a key not existing, or
its private file being inaccessible.

Older versions of dnssec-signzone didn't check for this; that's why
it never appeared to be a problem until now.

Note that sometimes it *isn't* a problem--for example, when you're
signing a zone in two phases, once with a ZSK and later with a KSK.  If
that's what's going on in your case, add the -P flag (for "partial") to
dnssec-signzone; that will suppress the validity check.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users