Re: BIND 9.8.0b1 Released Today

2011-01-21 Thread JINMEI Tatuya / 神明達哉
At Fri, 21 Jan 2011 14:00:19 -0500 (EST),
Paul Wouters  wrote:

> >* BIND now supports a new zone type, static-stub. This allows the
> > administrator of a recursive nameserver to force queries for a
> > particular zone to go to IP addresses of the administrator's choosing,
> > on a per zone basis, both globally or per view. I.e. if the
> > administrator wishes to have their recursive server query 192.0.2.1 and
> > 192.0.2.2 for zone example.com rather than the servers listed by the
> > .com gTLDs, they would configure example.com as a static-stub zone in
> > their recursive server. [RT #21474]
> 
> Does this work with DNSSEC if one loads an explicit trust anchor, even
> if in the "world view" the trust anchor is missing?

I'm afraid I don't understand the question.  Could you be more
specific, e.g., by using the above example.com example?

---
JINMEI, Tatuya
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.8.0b1 Released Today

2011-01-21 Thread pyh
Sue Graves writes: 


New Features
9.8.0
* BIND now supports a new zone type, static-stub. This allows the
administrator of a recursive nameserver to force queries for a
particular zone to go to IP addresses of the administrator's choosing,
on a per zone basis, both globally or per view. I.e. if the
administrator wishes to have their recursive server query 192.0.2.1 and
192.0.2.2 for zone example.com rather than the servers listed by the
.com gTLDs, they would configure example.com as a static-stub zone in
their recursive server. [RT #21474]


Thanks that's great meaningful from my point.
Once I did need this feature years ago, but bind didnt have at that time.
So I wrote a kernel module with linux kernel to intercept the DNS requests 
and match them with special domains. If matched, the module will return the 
customized responses directly rather than letting bind to answer them. The 
module opens two TCP ports on kernel so it even supports administrative 
commands via socket. 


tcp0  0 127.0.0.1:  0.0.0.0:*   LISTEN
tcp0  0 127.0.0.1:4445  0.0.0.0:*   LISTEN 

Now bind provides this capibility I think it's great much for the bind 
based products so called GSLB(?) so that it can direct clients' traffic to 
different sites in different situations. 


Regards.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


failed multi-view zone transfer

2011-01-21 Thread jeffreyp

greetings,

i'm in the midst of an odd problem (to me, anyway) and would appreciate 
any pointers.


three servers, all running bind-9.7.2-P3 compiled from source with the 
same options.  one master; two slaves.  two views:  internal and 
external.  one master and one slave are on the same subnet with just a 
switch between 'em; the other slave is on a different subnet "out on the 
internet".


i'm wanting to have both views for all zones transferred to both slaves. 
 i've set things up with tsig and per mark andrews' great scheme 
documented at 
http://www.mail-archive.com/bind-users@lists.isc.org/msg03593.html


transfers from the master to the slave on its same subnet happen as 
desired; transfers from the master to the slave on the different subnet 
do not.


notify logging shows that the notifies are being properly received by 
both slaves.


my master zone definitions specify also-notify for both slaves.  each 
slave zone definition specifies a masters statement.


what i've observed (initially because of a typo and quite by chance) is 
that the transfer to the slave on the internet does not happen if the 
host specified in the SOA's MNAME field is also specified in an NS record.


but if the host specified in the SOA's MNAME field is not an NS record 
then the transfer does complete.  and therein lies the problem.


i've intentionally not posted my config, thinking someone might 
recognize this off the top of their head.  i will certainly post it if 
necessary.


thanks,

jeffreyp
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Mark Andrews

In message , Barry Mar
golin writes:
> In article ,
>  Dave Knight  wrote:
> 
> > I guess the tool just always assumes that there's probably a www worthy 
> > asking about
> 
> That's what I assumed at first, too.  But the report for his domain also 
> included NS records for the subdomain test.nsbeta.info.  Do you think it 
> also has test. in its default set of names to look up?

It would get the NS records returned in the referral / answer from the
test zone and as they are supposed to be the same it doesn't matter from
which zone they come from.
 
> -- 
> Barry Margolin, bar...@alum.mit.edu
> Arlington, MA
> *** PLEASE don't copy me on replies, I'll read them in the group ***
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.8.0b1 Released Today

2011-01-21 Thread Paul Wouters

On Fri, 21 Jan 2011, Sue Graves wrote:


   * BIND now supports a new zone type, static-stub. This allows the
administrator of a recursive nameserver to force queries for a
particular zone to go to IP addresses of the administrator's choosing,
on a per zone basis, both globally or per view. I.e. if the
administrator wishes to have their recursive server query 192.0.2.1 and
192.0.2.2 for zone example.com rather than the servers listed by the
.com gTLDs, they would configure example.com as a static-stub zone in
their recursive server. [RT #21474]


Does this work with DNSSEC if one loads an explicit trust anchor, even
if in the "world view" the trust anchor is missing?

(eg can you use this to more easilly deploy dnssec testbeds similar to
how unbound can do this?

Paul
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.8.0b1 Released Today

2011-01-21 Thread Sue Graves
Introduction

BIND 9.8.0b1 is the first beta release of BIND 9.8.

This document summarizes changes from BIND 9.7 to BIND 9.8. Please see
the CHANGES file in the source code release for a complete list of all
changes.

Download
The latest development versions of BIND 9 software can always be found
on our web site at http://www.isc.org/downloads/development. There you
will find additional information about each release, source code, and
some pre-compiled versions for certain operating systems.

Support
Product support information is available on
http://www.isc.org/services/support for paid support options. Free
support is provided by our user community via a mailing list.
Information on all public email lists is available at
https://lists.isc.org/mailman/listinfo.

New Features
9.8.0
* BIND now supports a new zone type, static-stub. This allows the
administrator of a recursive nameserver to force queries for a
particular zone to go to IP addresses of the administrator's choosing,
on a per zone basis, both globally or per view. I.e. if the
administrator wishes to have their recursive server query 192.0.2.1 and
192.0.2.2 for zone example.com rather than the servers listed by the
.com gTLDs, they would configure example.com as a static-stub zone in
their recursive server. [RT #21474]
* BIND now supports Response Policy Zones, a way of expressing
"reputation" in real time via specially constructed DNS zones. See the
draft specification here:
http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt [RT #21726]
* BIND 9.8.0 now has DNS64 support. named synthesizes  records
from specified A records if no  record exists. IP6.ARPA CNAME
records will be synthesized from corresponding IN-ADDR.ARPA. [RT
#21991/22769]
* Dynamically Loadable Zones (DLZ) now support dynamic updates.
Contributed by Andrew Tridgell of the Samba Project. [RT #22629]
* Added a "dlopen" DLZ driver, allowing the creation of external DLZ
drivers that can be loaded as shared objects at runtime rather than
having to be linked with named at compile time. Currently this is
switched on via a compile-time option, "configure --with-dlz-dlopen".
Note: the syntax for configuring DLZ zones is likely to be refined in
future releases. Contributed by Andrew Tridgell of the Samba Project.
[RT #22629]
* named now retains GSS-TSIG keys across restarts. This is for
compatibility with Microsoft DHCP servers doing dynamic DNS updates for
clients, which don't know to renegotiate the GSS-TSIG session key when
named restarts. [RT #22639]
* There is a new update-policy match type "external". This allows
named to decide whether to allow a dynamic update by checking with an
external daemon. Contributed by Andrew Tridgell of the Samba Project.
[RT #22758]
* There have been a number of bug fixes and ease of use enhancements
for configuring BIND to support GSS-TSIG [RT #22629/22795]. These include:
  o Added a "tkey-gssapi-keytab" option. If set, dynamic updates
will be allowed for any key matching a Kerberos principal in the
specified keytab file. "tkey-gssapi-credential" is no longer required
and is expected to be deprecated. Contributed by Andrew Tridgell of the
Samba Project. [RT #22629]
  o It is no longer necessary to have a valid /etc/krb5.conf
file. Using the syntax DNS/hostname@REALM in nsupdate is sufficient for
to correctly set the default realm. [RT #22795]
  o Documentation updated new gssapi configuration options (new
option tkey-gssapi-keytab and changes in tkey-gssapi-credential and
tkey-domain behavior). [RT 22795]
  o DLZ correctly deals with NULL zone in a query. [RT 22795]
  o TSIG correctly deals with a NULL tkey->creator. [RT 22795]

Feature Changes
9.8.0
* There is a new option in dig, +onesoa, that allows the final SOA
record in an AXFR response to be suppressed. [RT #20929
* There is additional information displayed in the recursing log
(qtype, qclass, qid and whether we are following the original name). [RT
#22043]
* For Mac OS X, you can now have the test interfaces used during
"make test" stay beyond reboot. See bin/tests/system/README for details.

Security Fixes
9.8.0
None.

Bug Fixes
9.8.0
* BIND now builds with threads disabled in versions of NetBSD
earlier than 5.0 and with pthreads enabled by default in NetBSD versions
5.0 and higher. Also removes support for unproven-pthreads, mit-pthreads
and ptl2. [RT #19203]
* If BIND has openssl compiled in (the default) and has any
permission problems opening the openssl.cnf file, BIND utilities fail.
Currently ISC is including a patch to openssl in
bin/pkcs11/openssl-0.9.8l-patch but ISC is working on a better solution
until openssl fixes this. [RT #20668]
* nsupdate will now preserve the entered case of domain names in
update requests it sends. [RT #20928]
* Added a regression test for fix 2896/RT #21045 ("rndc sign" failed
to properly update the zone when adding a DNSKEY for publication only).
[RT #2

Re: get a domain's dns records

2011-01-21 Thread Barry Margolin
In article ,
 Dave Knight  wrote:

> I guess the tool just always assumes that there's probably a www worthy 
> asking about

That's what I assumed at first, too.  But the report for his domain also 
included NS records for the subdomain test.nsbeta.info.  Do you think it 
also has test. in its default set of names to look up?

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: why queries rejected?

2011-01-21 Thread John Wobus

It might not be your bug.  It might be other sites.

As was said, bind can log info that would help
explain it.

Or if the number is rising continuously, you can capture a
bunch of dns queries with tcpdump or a similar program
and look over a sample of the rejected queries.

On Jan 18, 2011, at 9:03 PM, p...@mail.nsbeta.info wrote:

My zone is game.yy.com, and there are so many "auth queries  
rejected" in
named.stats which was generated by "rndc stats". Could you show me  
some way

to debug it? Thanks.

[game.yy.com]
 671834 auth queries rejected
   3003 recursive queries rejected
 685192 queries resulted in successful answer
 685891 queries resulted in authoritative answer
676 queries resulted in nxrrset
 23 queries resulted in NXDOMAIN
  4 requested transfers completed
  7 updates completed



p...@mail.nsbeta.info writes:






You haven't provided enough information for us to know. Have you
bothered checking logs?



Nothing special in logs from what I checked.


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Phil Mayers

On 21/01/11 14:21, p...@mail.nsbeta.info wrote:

Dave Knight writes:




I guess the tool just always assumes that there's probably a www worthy asking 
about



But how does the site know I have a sub domain test.nsbeta.info and its
name servers? I didn't think that I have got this sub domain be public.


It guessed.

See my other email. It tries a number of other names too (blog, forum, 
help, mail)

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: get a domain's dns records

2011-01-21 Thread Lightner, Jeff
It checks for test. - I saw it do that for my zone.  For us it
isn't a subdomain but simply an A record.   Apparently when it found
your record it went ahead and did another check for your sub-zone.

I'm surprised that it does not check for ftp..   Whenever we're
doing acquisitions here that is one of the zones I find at most sites
(though often enough it uses the same IP as the www.. 

-Original Message-
From: bind-users-bounces+jlightner=water@lists.isc.org
[mailto:bind-users-bounces+jlightner=water@lists.isc.org] On Behalf
Of p...@mail.nsbeta.info
Sent: Friday, January 21, 2011 9:21 AM
To: Dave Knight
Cc: comp-protocols-dns-b...@isc.org; Barry Margolin
Subject: Re: get a domain's dns records

Dave Knight writes: 


> 
> I guess the tool just always assumes that there's probably a www
worthy asking about 
> 

But how does the site know I have a sub domain test.nsbeta.info and its 
name servers? I didn't think that I have got this sub domain be public. 

Regards.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
 
Proud partner. Susan G. Komen for the Cure.
 
Please consider our environment before printing this e-mail or attachments.
--
CONFIDENTIALITY NOTICE: This e-mail may contain privileged or confidential 
information and is for the sole use of the intended recipient(s). If you are 
not the intended recipient, any disclosure, copying, distribution, or use of 
the contents of this information is prohibited and may be unlawful. If you have 
received this electronic transmission in error, please reply immediately to the 
sender that you have received the message in error, and delete it. Thank you.
--
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: get a domain's dns records

2011-01-21 Thread Todd Snyder
It seems to do a regular lookup, plus maybe an ANY

But I've also noticed that it seems to find test.domain.com.  I often put a 
'test.whatever.com. IN A 127.0.0.1' into zones and a couple I checked it found 
them, even though it shouldn't have by "normal" means

it also found a 'blog' record I had on one of my domains ...

so, it must be looking for some specific records in addition to general lookups.

t.

-Original Message-
From: bind-users-bounces+tsnyder=rim@lists.isc.org 
[mailto:bind-users-bounces+tsnyder=rim@lists.isc.org] On Behalf Of 
p...@mail.nsbeta.info
Sent: Friday, January 21, 2011 1:20 AM
To: bind-users
Subject: get a domain's dns records


I'm jsut curious, how does "who.is" know the dns records in my domain 
(nsbeta.info)? 

The page shows some of my RRs exactly: 

http://who.is/dns/nsbeta.info/ 

Regards.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

-
This transmission (including any attachments) may contain confidential 
information, privileged material (including material protected by the 
solicitor-client or other applicable privileges), or constitute non-public 
information. Any use of this information by anyone other than the intended 
recipient is prohibited. If you have received this transmission in error, 
please immediately reply to the sender and delete this information from your 
system. Use, dissemination, distribution, or reproduction of this transmission 
by unintended recipients is not authorized and may be unlawful.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Torinthiel
Dnia 2011-01-21 08:50 Barry Margolin napisał(a):

>In article ,
> Joseph S D Yao  wrote:
>
>> On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:
>> > 
>> > I'm jsut curious, how does "who.is" know the dns records in my domain 
>> > (nsbeta.info)? 
>> > 
>> > The page shows some of my RRs exactly: 
>> > 
>> > http://who.is/dns/nsbeta.info/ 
>> 
>> 
>> The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
>> Who.is - Who.is".  They probably did just exactly that - DNS lookup.
>> Anything in DNS is public information.
>
>But the nameservers for the domain don't allow public zone transfers.  
>So if you know the names in the zone you can look them up, but how did 
>the site list the names in his zone?


My guess would be that they don't list the whole zone. Look what's there:
nsbeta.info (dig any nsbeta.info) and some quite easy to guess prefixes: 
mail, test and www. And everything deduced from them, like names 
test.nsbeta.info and mail.nsbeta.info resolve to.
Probably all questions asked with ANY recordtype
I've tested on two other domains, and it looks like that - results show that 
common prefixes also include blog. And they have some filtering of results, 
as I have a * TXT record which didn't show up as blog entry. Actually dig 
any on my zone gives even more information - e.g. SPF record , which didn't 
show up on results. And they don't support third-level domains as well - 
asking form mail.nsbeta.info returns information about nsbeta.info
Torinthiel
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: DNSSEC auto-dnssec issue bind-9.7.2-P3

2011-01-21 Thread Kalman Feher



On 21/01/11 2:05 PM, "Zbigniew Jasiński"  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> W dniu 2011-01-21 11:23, Kalman Feher pisze:
>> The only way I can replicate the behaviour is with dnssec-enable no or with
>> an unsigned version of the zone in another view. Assuming you've not
>> overlapped your views in such a way (it was a very contrived test), I think
>> you'll need to provide a bit more information on your configuration.
>> 
>> -options
>> -relevant view statement
>> -The zone statement (from the hashed file if you are using the new dynamic
>> zones feature).
>> -The zone itself
>> -Query logs. 
>> 
>> Without the full dig output it is hard to see what is actually happening.
>> I'd suggest including that as well.
>> 
>> If you dig axfr or dig rrsig are the signatures present?
>> 
> 
> I've conducted test with 'auto-dnssec allow' and that works without any
> single problem, than I just change this options to 'auto-dnssec
> maintain' and odd things happen.
> 
Perhaps we are getting close to the problem then.
Can you show the content of the key files? Specifically the metadata which
the "maintain" option wants.

Since "allow" works I'm assuming that key file permissions (and directory
permissions) are ok, but it couldn't hurt to check them.
> Didn't mentioned before but this named is working with SoftHSM. But like
> I said no problems with 'auto-dnssec allow'.
> 
> this is zone conf:
> 
> zone "example" {
> type master;
> file "var/zone/example";
> allow-update { loopback; };
> allow-transfer { trusted; loopback; };
> auto-dnssec maintain;
> key-directory "var/keys/example";
> };
> 
> named.conf:
> 
> controls {
> inet 127.0.0.1 port 953 allow { 127.0.0.1; } keys { "rndc-key"; };
> inet ::1 port 953 allow { ::1; } keys { "rndc-key"; };
> };
> 
> acl trusted {
> 127.0.0.1;
> 172.16.7.5;
> };
> 
> acl loopback {
> 127.0.0.1;
> };
> 
> acl eth0 {
> 172.16.7.5;
> };
> 
> options {
> directory "/";
> query-source address 172.16.7.5;
> notify-source 172.16.7.5;
> transfer-source 172.16.7.5;
> port 53;
> pid-file "var/run/named/named.pid";
> session-keyfile "var/run/named/session.key";
> listen-on {
> loopback;
> eth0;
> };
> listen-on-v6 { none; };
> recursion no;
> notify explicit;
> allow-query { trusted; };
> 
> dnssec-enable yes;
> dnssec-validation yes;
> max-journal-size 100k;
> random-device "/dev/urandom";
> };
> 
> this is zone file:
> 
> $TTL3600
> example.SOA ns1.example. bugs.x.w.example. (
> 1292481908
> 7200
> 3600
> 734400
> 600
> )
> TXT "dnssec test"
> NS ns1.example.
> NS ns2.example.
> $ORIGIN example.
> ns1 A   127.0.0.3
> ns2 A   127.0.0.4
> 
> a   NS  ns1.a
> NS  ns2.a
> DS 23344 5 1 CECDDBFFD6A0C01F8D7E96C4BE31CB577433DD56
> 
> ns1.a   IN  A   127.0.0.1
> ns2.a   IN  A   127.0.0.1
> 
> c   NS  ns1.c
> c   NS  ns2.c
> ns1.c   IN  A   127.0.0.5
> ns2.c   IN  A   127.0.0.6
> 
> ai  IN  A   127.0.0.1
> IN  0:0:0:0:0:0:0:1
> xx  IN  A   127.0.0.1
> IN  0:0:0:0:0:0:0:1
> 
> w   IN  A   127.0.0.1
> *.w MX 10   ai
> x.w MX 10   xx
> x.y.w   MX 10   xx
> 
> If I make query for RRSIG records, named is returning proper signatures.
> for example for SOA record:
> 
> $ dig @127.0.0.1 example rrsig +short
> SOA 10 1 3600 20110220123506 20110121113506 51587 example.
> cVzWYkeTASPUiHv0DxFXpTsK4G1QkpS3sZ1jXmDCDv+EaYUs2C/kRlD9
> 
> 
> same with AXFR, and same for zone file.
> 
> - -- 
> regards
> 
> zbigniew jasinski
> [SYStem OPerator]
> 
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.10 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iQIcBAEBAgAGBQJNOYSaAAoJEH26UYiRhe/gNmcQALSiNOVoKWBpA/GV1WiarmDt
> b+G6NZPBOtXXW4U90XDqL211TUaeXgLfwesRfIERraDxOTtCPjTx9npIoMQMLrWk
> F91slmf8thgLpPzFqwe2FxMoagL/HdQ8fXrzHmdMU5Lsg8gBalJyVKL56Hozlp9R
> n5LZy8+QBSJHuJKXFIZcBPPCdUW8dEJcONve01ik09gHbwcQzCuqwY7S5vYrDW2s
> fZhYQUCvjdBpmf3uKH1yXiqdtUtUerZN3fCB6r4cGIkzYk98iEj5M6fngsBl49vt
> SijzWbQftd0ThSxHPcEiuSom4pAuFlxN1O7Al8laIRwgme5wvtUeN+PA8sxr7FWl
> cnUC///yLnYJNTJBnbIY0wiWsSTU9H4LU42tnesAKJaIBmaOR9w6QgxLs+E+pyKM
> M3pnC//ZqxGirnV9YetV6mqfch23Y08yWcmjTNI8QytEoXPMMaGXyh4IYJFAiMaz
> SxV5B9Be1KP1DxO2wyHwDEwrZzIkS5sl1iiaoyb+G0d9dWjuvlSmkDSZA43nYXGS
> cn91vMLqUHpYCYVIy3p8w62y7+jOPrIM94vsgONjPijqlB0DZY2JsMP4q2StHUui
> cYEqw5N

Re: get a domain's dns records

2011-01-21 Thread pyh
Dave Knight writes: 





I guess the tool just always assumes that there's probably a www worthy asking about 



But how does the site know I have a sub domain test.nsbeta.info and its 
name servers? I didn't think that I have got this sub domain be public. 


Regards.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Phil Mayers

On 21/01/11 14:18, Phil Mayers wrote:

On 21/01/11 13:50, Barry Margolin wrote:

In article,
   Joseph S D Yao   wrote:


On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:


I'm jsut curious, how does "who.is" know the dns records in my domain
(nsbeta.info)?

The page shows some of my RRs exactly:

http://who.is/dns/nsbeta.info/



The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
Who.is - Who.is".  They probably did just exactly that - DNS lookup.
Anything in DNS is public information.


But the nameservers for the domain don't allow public zone transfers.
So if you know the names in the zone you can look them up, but how did
the site list the names in his zone?



Most of the records are well-known (i.e. A/MX/NS/SOA on the zone apex,
or www.zone.name) or lookups of the RHS of a well-known. The site
appears to probe for "test.zone.name".

So it didn't "list" the zone. It looked up some well-known names and RRs
and got replies.


In case anyone is curious, I tried it with our zone and then looked in 
the query logs; it looks for:


174.36.196.245#54513: view main: query: zone.name IN A +
174.36.196.245#33561: view main: query: zone.name IN MX +
174.36.196.245#34074: view main: query: zone.name IN NS +
174.36.196.245#44305: view main: query: zone.name IN SOA +
174.36.196.245#50109: view main: query: zone.name IN TXT +
174.36.196.245#52299: view main: query: blog.zone.name IN A +
174.36.196.245#59078: view main: query: forum.zone.name IN A +
174.36.196.245#51346: view main: query: help.zone.name IN A +
174.36.196.245#40281: view main: query: mail.zone.name IN A +
174.36.196.245#45344: view main: query: mail.zone.name IN MX +
174.36.196.245#34294: view main: query: test.zone.name IN A +
174.36.196.245#48627: view main: query: www.zone.name IN A +
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Phil Mayers

On 21/01/11 13:50, Barry Margolin wrote:

In article,
  Joseph S D Yao  wrote:


On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:


I'm jsut curious, how does "who.is" know the dns records in my domain
(nsbeta.info)?

The page shows some of my RRs exactly:

http://who.is/dns/nsbeta.info/



The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
Who.is - Who.is".  They probably did just exactly that - DNS lookup.
Anything in DNS is public information.


But the nameservers for the domain don't allow public zone transfers.
So if you know the names in the zone you can look them up, but how did
the site list the names in his zone?



Most of the records are well-known (i.e. A/MX/NS/SOA on the zone apex, 
or www.zone.name) or lookups of the RHS of a well-known. The site 
appears to probe for "test.zone.name".


So it didn't "list" the zone. It looked up some well-known names and RRs 
and got replies.

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Dave Knight

On 2011-01-21, at 8:50 AM, Barry Margolin wrote:

> In article ,
> Joseph S D Yao  wrote:
> 
>> On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:
>>> 
>>> I'm jsut curious, how does "who.is" know the dns records in my domain 
>>> (nsbeta.info)? 
>>> 
>>> The page shows some of my RRs exactly: 
>>> 
>>> http://who.is/dns/nsbeta.info/ 
>> 
>> 
>> The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
>> Who.is - Who.is".  They probably did just exactly that - DNS lookup.
>> Anything in DNS is public information.
> 
> But the nameservers for the domain don't allow public zone transfers.  
> So if you know the names in the zone you can look them up, but how did 
> the site list the names in his zone?
> 

I just tried this with one of mine "sanxion.org"

It returned

> sanxion.org   MX  5 minutes   100 sb.sanxion.org
> sanxion.org   NS  5 minutes   ns-ext.isc.org
> sanxion.org   NS  5 minutes   borg.c-l-i.net
> sanxion.org   NS  5 minutes   ns.c-l-i.net
> sanxion.org   SOA 5 minutes   borg.c-l-i.net. 
> dave.sanxion.org. 2011010900 3600 1800 604800 3600

The above might have been gotten either with separate queries for

sanxion.org./in/mx
sanxion.org./in/ns
sanxion.org./in/soa

or a single

sanxion.org./in/any


> sb.sanxion.orgA   5 minutes   216.235.14.46 
> (Gatineau, QC, CA)
> sb.sanxion.org5 minutes   
> 2001:4900:1:393:211:d8ff:fe9b:6b7c

these are returned in the additional section when doing the mx, or any query 
above


> www.sanxion.org   A   5 minutes   85.17.60.159 
> (Amsterdam, 07, NL)

I guess the tool just always assumes that there's probably a www worthy asking 
about


dave
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: when one view doesn't have the zone

2011-01-21 Thread Barry Margolin
In article ,
 p...@mail.nsbeta.info wrote:

> In  fact I want to the clients that match view_b to fall into the default 
> view, say it's view_c. 

There is no fall-through in views.  The search stops when it finds the 
first view that matches.  Each view is like a totally separate server 
(which is actually what we did before views were added to BIND).

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Barry Margolin
In article ,
 Joseph S D Yao  wrote:

> On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:
> > 
> > I'm jsut curious, how does "who.is" know the dns records in my domain 
> > (nsbeta.info)? 
> > 
> > The page shows some of my RRs exactly: 
> > 
> > http://who.is/dns/nsbeta.info/ 
> 
> 
> The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
> Who.is - Who.is".  They probably did just exactly that - DNS lookup.
> Anything in DNS is public information.

But the nameservers for the domain don't allow public zone transfers.  
So if you know the names in the zone you can look them up, but how did 
the site list the names in his zone?

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: get a domain's dns records

2011-01-21 Thread Joseph S D Yao
On Fri, Jan 21, 2011 at 02:19:45PM +0800, p...@mail.nsbeta.info wrote:
> 
> I'm jsut curious, how does "who.is" know the dns records in my domain 
> (nsbeta.info)? 
> 
> The page shows some of my RRs exactly: 
> 
> http://who.is/dns/nsbeta.info/ 


The title of the page is, "Nsbeta.info DNS Lookup | Nameserver Lookup -
Who.is - Who.is".  They probably did just exactly that - DNS lookup.
Anything in DNS is public information.


--
/*\
**
** Joe Yao  j...@tux.org - Joseph S. D. Yao
**
\*/
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC auto-dnssec issue bind-9.7.2-P3

2011-01-21 Thread Zbigniew Jasiński
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

W dniu 2011-01-21 11:23, Kalman Feher pisze:
> The only way I can replicate the behaviour is with dnssec-enable no or with
> an unsigned version of the zone in another view. Assuming you've not
> overlapped your views in such a way (it was a very contrived test), I think
> you'll need to provide a bit more information on your configuration.
> 
> -options
> -relevant view statement
> -The zone statement (from the hashed file if you are using the new dynamic
> zones feature).
> -The zone itself
> -Query logs. 
> 
> Without the full dig output it is hard to see what is actually happening.
> I'd suggest including that as well.
> 
> If you dig axfr or dig rrsig are the signatures present?
> 

I've conducted test with 'auto-dnssec allow' and that works without any
single problem, than I just change this options to 'auto-dnssec
maintain' and odd things happen.

Didn't mentioned before but this named is working with SoftHSM. But like
I said no problems with 'auto-dnssec allow'.

this is zone conf:

zone "example" {
type master;
file "var/zone/example";
allow-update { loopback; };
allow-transfer { trusted; loopback; };
auto-dnssec maintain;
key-directory "var/keys/example";
};

named.conf:

controls {
inet 127.0.0.1 port 953 allow { 127.0.0.1; } keys { "rndc-key"; };
inet ::1 port 953 allow { ::1; } keys { "rndc-key"; };
};

acl trusted {
127.0.0.1;
172.16.7.5;
};

acl loopback {
127.0.0.1;
};

acl eth0 {
172.16.7.5;
};

options {
directory "/";
query-source address 172.16.7.5;
notify-source 172.16.7.5;
transfer-source 172.16.7.5;
port 53;
pid-file "var/run/named/named.pid";
session-keyfile "var/run/named/session.key";
listen-on {
loopback;
eth0;
};
listen-on-v6 { none; };
recursion no;
notify explicit;
allow-query { trusted; };

dnssec-enable yes;
dnssec-validation yes;
max-journal-size 100k;
random-device "/dev/urandom";
};

this is zone file:

$TTL3600
example.SOA ns1.example. bugs.x.w.example. (
1292481908
7200
3600
734400
600
)
TXT "dnssec test"
NS ns1.example.
NS ns2.example.
$ORIGIN example.
ns1 A   127.0.0.3
ns2 A   127.0.0.4

a   NS  ns1.a
NS  ns2.a
DS 23344 5 1 CECDDBFFD6A0C01F8D7E96C4BE31CB577433DD56

ns1.a   IN  A   127.0.0.1
ns2.a   IN  A   127.0.0.1

c   NS  ns1.c
c   NS  ns2.c
ns1.c   IN  A   127.0.0.5
ns2.c   IN  A   127.0.0.6

ai  IN  A   127.0.0.1
IN  0:0:0:0:0:0:0:1
xx  IN  A   127.0.0.1
IN  0:0:0:0:0:0:0:1

w   IN  A   127.0.0.1
*.w MX 10   ai
x.w MX 10   xx
x.y.w   MX 10   xx

If I make query for RRSIG records, named is returning proper signatures.
for example for SOA record:

$ dig @127.0.0.1 example rrsig +short
SOA 10 1 3600 20110220123506 20110121113506 51587 example.
cVzWYkeTASPUiHv0DxFXpTsK4G1QkpS3sZ1jXmDCDv+EaYUs2C/kRlD9


same with AXFR, and same for zone file.

- -- 
regards

zbigniew jasinski
[SYStem OPerator]

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=dt7w
-END PGP SIGNATURE-

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Telling rndc Which IP Address to Use

2011-01-21 Thread Phil Mayers

On 01/20/2011 09:28 PM, Mark Andrews wrote:


Or one can not worry about the IP address being used.  The addresses
are still there for backwards compatibilty with BIND 8 where only
the IP address is used.  TSIG is really so much stronger than any
IP based authentication.  It's like putting a screen door on a bank
vault.


There are other reasons than authentication to care about IP addresses. 
For example, complex policy-routed or multihomed environments where 
different source IPs are routed differently.


By which I mean: please don't remove this option ;o)
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC auto-dnssec issue bind-9.7.2-P3

2011-01-21 Thread Kalman Feher
The only way I can replicate the behaviour is with dnssec-enable no or with
an unsigned version of the zone in another view. Assuming you've not
overlapped your views in such a way (it was a very contrived test), I think
you'll need to provide a bit more information on your configuration.

-options
-relevant view statement
-The zone statement (from the hashed file if you are using the new dynamic
zones feature).
-The zone itself
-Query logs. 

Without the full dig output it is hard to see what is actually happening.
I'd suggest including that as well.

If you dig axfr or dig rrsig are the signatures present?



On 21/01/11 9:13 AM, "Zbigniew Jasiński"  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> W dniu 2011-01-19 18:38, Hauke Lampe pisze:
> 
>> Another thing you might check:
>> 
>> With "dnssec-enable no;" in named.conf, BIND still does its automatic
>> DNSSEC signing but won't add RRSIG to responses.
>> 
>> I ran across such a configuration lately. Your problem sounds similar.
>> 
>> 
>> Hauke.
> 
> that was first thing which I've checked:
> 
> dnssec-enable yes;
> 
> and it's of course enabled.
> 
> I see in journal file:
> 
> ./sbin/named-journalprint var/zone/example.jnl
> 
> add example. 3600IN  RRSIG   DNSKEY 10 1 3600
> 20110218225336 20110119215336 57635 example.
> Xo9o137Q4BmELA0wumTLujJkHq0b/tDbYvuFCfZDfcbp8cuutDJUxCPy
> 
> add example. 3600IN  RRSIG   DNSKEY 10 1 3600
> 20110218225336 20110119215336 57636 example.
> SfFa5xjRtb/VBm3Zv1j31VRlqJORM0laX1PuZ+Asi6IFutH4q5TeknYN
> 
> add example. 3600IN  RRSIG   SOA 10 1 3600
> 20110218225336 20110119215336 57635 example.
> wYZ/nZbnN6HGrWTDLkfbyW4dQGMVs1ZVY+r8zc9t92ykxu7ipycxnITW
> 
> 
> also RRSIG for SOA record and for DNSKEY records are present in plain
> zone file but still named isn't responding with correct signatures.
> 
> - -- 
> regards
> 
> zbigniew jasinski
> [SYStem OPerator]
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.10 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iQIcBAEBAgAGBQJNOUAtAAoJEH26UYiRhe/goMcP/i5MLxBFh8+Fl2R2oqIKdRR1
> ntBcfXBK1niJmlDpFzGu97gXNxoofk/bWVEhb+eo/e4+ln8bSuOiKVV5PQJ8zq1t
> ke5jCIw7iRdBQgMcZNHQCWcI1lCWnPc0SxcCtw6u2ZItfFxqwANwFJw0oXwX/C8i
> iVGflBdSUI9G/MGIaCsiwBdNBZnVhgrVz5F3KHXKC6aH49HI9kieXqz8v9pczcGR
> xoy/RRrgObvb8N4jz2GA+fq8thFoKzZkoWLWG/5eE9uYd8oY3wLHIoAt0jBfGXOR
> UXrFQ1QDqjUdotb3ovUGH2NH1NpWnITYm9gDWqEo3egaLpQU6itc2z57BNkuIkPS
> qn3m2rgnEKy+p6flLYNxwyYnrXWVIpti73r+aPpkWQpWptEBcyCIl2su6yLZPv1y
> R7ioFCualJLOWWqio9w5hQeRUvgrF6w7XBc97PMWgwLSrjHF0XADOWn9IqB4/XgA
> agPSo7p8D6mmfpnv9c+q1JVIUEhEqihNs5/c1/dhRRn4SRIucvvzuVlXB/gqVQep
> i+Ft2Tq3zgepBOxLGtZQ22o7VoBSWj8tHT6qRDG9qChsOXE054eN+r8xNbJ4rRzu
> oASw1n11vm0JAqceMeadCc0Zz2y4WbIJO7jEsPTp9KUHPNwbDmNnMH7pWyHvxS4v
> oZD7PbxPnyDpwRerG7zh
> =Sp+3
> -END PGP SIGNATURE-
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Kal Feher 

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNSSEC auto-dnssec issue bind-9.7.2-P3

2011-01-21 Thread Zbigniew Jasiński
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

W dniu 2011-01-19 18:38, Hauke Lampe pisze:

> Another thing you might check:
> 
> With "dnssec-enable no;" in named.conf, BIND still does its automatic
> DNSSEC signing but won't add RRSIG to responses.
> 
> I ran across such a configuration lately. Your problem sounds similar.
> 
> 
> Hauke.

that was first thing which I've checked:

dnssec-enable yes;

and it's of course enabled.

I see in journal file:

./sbin/named-journalprint var/zone/example.jnl

add example. 3600IN  RRSIG   DNSKEY 10 1 3600
20110218225336 20110119215336 57635 example.
Xo9o137Q4BmELA0wumTLujJkHq0b/tDbYvuFCfZDfcbp8cuutDJUxCPy

add example. 3600IN  RRSIG   DNSKEY 10 1 3600
20110218225336 20110119215336 57636 example.
SfFa5xjRtb/VBm3Zv1j31VRlqJORM0laX1PuZ+Asi6IFutH4q5TeknYN

add example. 3600IN  RRSIG   SOA 10 1 3600
20110218225336 20110119215336 57635 example.
wYZ/nZbnN6HGrWTDLkfbyW4dQGMVs1ZVY+r8zc9t92ykxu7ipycxnITW


also RRSIG for SOA record and for DNSKEY records are present in plain
zone file but still named isn't responding with correct signatures.

- -- 
regards

zbigniew jasinski
[SYStem OPerator]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=Sp+3
-END PGP SIGNATURE-

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users