Re: expected covering NSEC3, got an exact match

2011-10-07 Thread Chris Thompson

On Sep 22 2011, I wrote:


There was some correspondence last year about this warning message, but
this seems to be caused by something new.

Since 2011-09-02 we have been seeing messages like this

Sep 22 16:38:52 authdns1.csx.cam.ac.uk named[646]: dnssec: warning:
client 149.20.58.131#52557: expected covering NSEC3, got an exact match

on both our main authoritative-only (recursion no) nameservers. Our own
zones don't use NSEC3, but we do officially slave two that do (srcf.net
and srcf.ucam.org) so I have been assuming that they are responsible in
some way. But we didn't change anything in the server configuration at
the time the messages started, and the zone administrator (hi, Malcolm!)
says the same about the contents of the two zones.

We were running BIND 9.7.4 at that stage, but upgrading to 9.8.1 hasn't
caused the messages to go away, as I had rather hoped.

Has anyone any clues about this one? Or observed anything similar?


We never did manage to track down exactly what was wrong with the
NSEC3 records, but the problem seems to have been cured by the zone
signer being upgraded from OpenDNSSEC 1.2.1 to 1.3.2.

--
Chris Thompson
Email: c...@cam.ac.uk
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Experience with DDNS (RFC 2136)

2011-10-07 Thread JINMEI Tatuya / 神明達哉
At 06 Oct 2011 20:26:48 +0100,
Chris Thompson c...@cam.ac.uk wrote:

 Are you willing to share the stories of your DDNS deployments, maybe
 including approximate number of zones, records, update frequencies,
 etc.?
 
 We converted all our regular DNS updating operations to use dynamic
 updates in May 2005, for those zones for which we[*] are master.
 That's currently 58 zones (many of them small, the largest is cam.ac.uk
 with c. 5 non-DNSSEC RRs) but would have been a few more then
 before our reverse zone consolidation exercise.
 
 We have never regretted this. We did have some Windows 2000 DNS Server
 stealth slaves that had to be given provide-ixfr no settings because
 they ed up applying incremental transfers, but they've all gone now
 (thank $DEITY). We already had most of the input to our DNS zone content
 generated from an external database (even more so now), but I don't
 think that was critical. Deciding to write a compare two zone files
 and generate nsupdate input to convert one to the other Perl script
 was.

Maybe an off topic in this thread, but out of curiosity, is there any
specific reason you don't use the database as the direct source of the
zone with BIND 9's dlz or PowerDNS?  In general it will be slower, and
DNSSEC signing might be an issue in that setup, but on the other hand
updates will be reflected immediately, (at least in theory) no need
for worrying about consistency, no need for additional script or DDNS
setups, and (although this may not be an issue with 58 zones w/ max 50K
RRs/zone) no need for waiting on reload.

---
JINMEI, Tatuya
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


nsupdate on a Windows ec2 instance to update dynamic DNS isn't working

2011-10-07 Thread kallen


hello,


i'm trying to update dynamic DNS for my windows ec2 instance by running
BIND's nsupdate from the instance. it's not working. i'll show details
below.

anyone have any idea what's going on? what else i should look at or try?

* nsupdate command reports no error
* my BIND nameserver never sees the packets
* running wireshark on the windows instance itself shows me it's not
  sending any packets to the nameserver
* the Windows Firewall Service is not running
* the windows instance runs Windows Server 2003, Datacenter Edition, R2

i do know the nameserver is set up correctly in that my linux instances
are able to update dynamic dns using nsupdate against this nameserver.


contents of update.txt:
server 10.x.x.x
zone dev.sushimysavior.com
update delete SOUS-CHEF-WIN.dev.sushimysavior.com. A 
update add SOUS-CHEF-WIN.dev.sushimysavior.com. 86400 IN A 10.y.y.y
show
debug
send

in case it is necessary, i have a resolv.conf in place at
C:\WINDOWS\system32\drivers\etc\resolv.conf that contains:

nameserver 10.x.x.x


and here's the nsupdate command run:

C:\work\binC:\WINDOWS\system32\dns\bin\nsupdate.exe -k 
C:\WINDOWS\system32\dns\etc\Kuser-ddns-ec2.sushimysavior.com.+157+14445.key -v 
-d -D -L 2 C:\WINDOWS\system32\dns\etc\update.txt
setup_system()
Creating key...
reset_system()
user_interaction()
get_next_command()
get_next_command()
get_next_command()
evaluate_update()
update_addordelete()
get_next_command()
evaluate_update()
update_addordelete()
get_next_command()
show_message()
Outgoing update query:
;; -HEADER- opcode: UPDATE, status: NOERROR, id:  0
;; flags:; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0
;; ZONE SECTION:
;dev.sushimysavior.com.  IN  SOA

;; UPDATE SECTION:
SOUS-CHEF-WIN.dev.sushimysavior.com. 0 ANY   A
SOUS-CHEF-WIN.dev.sushimysavior.com. 86400 IN A  10.y.y.y

get_next_command()
get_next_command()
cleanup()
Shutting down task manager
shutdown_program()
Shutting down request manager
Freeing TSIG key
Destroy DST lib
Destroying request manager
Freeing the dispatchers
Shutting down dispatch manager
Destroying event
Shutting down socket manager
Shutting down timer manager
Destroying hash context
Destroying name state
Removing log context
Destroying memory context

C:\work\bin



thanks!
kallen


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Experience with DDNS (RFC 2136)

2011-10-07 Thread Phil Mayers

On 10/07/2011 06:43 PM, JINMEI Tatuya / 神明達哉 wrote:


Maybe an off topic in this thread, but out of curiosity, is there any
specific reason you don't use the database as the direct source of the
zone with BIND 9's dlz or PowerDNS?  In general it will be slower, and


I can't speak for Chris but here, we rejected DLZ and similar because:

 1. DNSSEC
 2. Speed
 3. Impedance mismatch between database schema and DNS
 4. Perceived second-class status of DLZ
 5. Loss of various things that are automatic if using zones (IXFR)
 6. Too-tight coupling between the SQL DB and DNS

Of all of them, #1 and #6 were probably the most important. Using a 
decent programming language to map your SQL into DNS means you get 
arbitrary flexibility. Having to shoehorn it into a small set of SQL 
queries denies you that.


Personally, even if bind were to use SQL for its own zone storage, I'd 
still separate the two. Loosely coupled systems are good.



DNSSEC signing might be an issue in that setup, but on the other hand
updates will be reflected immediately, (at least in theory) no need


It's pretty trivial to use triggers to push updates via DDNS if you're 
so inclined.



for worrying about consistency, no need for additional script or DDNS
setups, and (although this may not be an issue with 58 zones w/ max 50K
RRs/zone) no need for waiting on reload.


There are no reloads with DDNS zones, so I'm not sure I follow you.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: dnssec config sanity check

2011-10-07 Thread Paul B. Henson

On 10/5/2011 10:25 AM, michoski wrote:


Your initial hope is what I missed comments on...


Me too; didn't get any that's horribly broken because or any that
looks good feedback, guess I'll just have to review it a couple more
times and hope for the best.


It is recommended that the transition of a KSK from the published
state to the ready state (introduction time) lasts for 45 days (RFC
5011, Automated Updates of DNS Security (DNSSEC) Trust Anchors). If
the parent of the zone is signed, the recommended introduction time
(SPARTA) is one week. The recommended period during which a KSK is
retired before it is removed from the zone (retirement time) is four
weeks. For the ZSK, the recommended introduction time is four days
and the retirement time is two weeks.

What values are other folks using?


I'm not sure why such a long retirement time is recommended,
particularly for the ZSK which has no dependencies on getting a parent
zone to update anything.

For the KSK, you don't want to use it to sign anything until the parent
has published the DS record, any old cached copies of that set without
the new one have expired, you've published the DNSKEY record, and any
old cached copies of that set have expired. For my case, I am publishing
the KSK for an entire year before using it, so can't see any issues
there. You don't want to remove a KSK until the parent has removed the
corresponding DS record, cached copies have expired, and there are no
longer any signatures floating around signed by it. My TTL is only 12
hours, so keeping it around for two weeks after I stop using it seems
more than sufficient (and if for some reason there is an excessive delay
getting the parent to remove the DS record, I can extend the publication
further).

For the ZSK, you don't want to sign anything with it after publication
until you are sure there are no old cached copies of the set floating
around without it. I'm going to publish the ZSK one month in advance of
using it, so again don't see any issues. You don't want to remove it
while there are potentially any cached signatures floating around that
use it. Again with a TTL of 12 hours, two days seems like it should be a
sufficient interval to wait.

You don't want your signature lifetime to be too short, resulting in
expired signatures before new ones are generated. My signature lifetime
will be 35 days, with a forced signing at least once a month on the
first of the month, along with a fresh signing anytime the backend data
changes. So I don't see a scenario where my signatures would expire.

The only edge case I can see that might cause a failure is if my primary
server dies or there is an issue transferring the new zone to
secondaries towards the end of the month. Hypothetically, if the
underlying data doesn't change, and the zone was only signed on the
first of the month, and an issue arises say the last week of the month,
there is a case where it is possible my secondaries will have a copy of
the zone that hasn't expired yet, but which does not have valid
signatures. I'm willing to live with this possibility, as the likelihood
of such a failure is low, and the likelihood it would be resolved
quickly is high :).

I guess if I missed anything at some point maybe Stephane Bortzmeyer
will be contacting me to let me know my dnssec deployment is broken and
asking what tool I'm using ;)...


--
Paul B. Henson  |  (909) 979-6361  |  http://www.csupomona.edu/~henson/
Operating Systems and Network Analyst  |  hen...@csupomona.edu
California State Polytechnic University  |  Pomona CA 91768
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Experience with DDNS (RFC 2136)

2011-10-07 Thread Evan Hunt
  1. DNSSEC
 
 Of all of them, #1 and #6 were probably the most important.

Note that this will be less of an issue in BIND 9.9: you can set up
a DLZ master and configure a slave to do inline signing.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users