RE: bind-users Digest, Vol 1485, Issue 1

2013-04-01 Thread Ben-Eliezer, Tal (ITS)
nly one handling dns requests)
>
> Before split-DNS, we had created our own TLD ... but the problem with 
> that was we couldn't buy SSL certificates for these services, and 
> there was no interest in having our users to accept self-signed certs 
> or to add a private CA to everything  so the TLD became a 
> subdomain that was only in the internal view (originally)...though 
> later added a stub in the external view to publish an MX record so 
> that users/apps sending mail without setting a correct from address 
> would still work. (sure I've told people they need to do this lots of 
> times...but then an important app was upgraded and the setting 
> lostbut it needed to work anyways.)
Not to start a religious war, but is all of this really simpler than basing 
your maintenance systems around Dynamic Update? Dynamic Update could also be 
used to do your DR switchover, if you don't already have dedicated 
load-balancer devices performing that function.

 - Kevin



--

Message: 2
Date: Mon, 01 Apr 2013 13:25:22 +1000
From: Noel Butler 
To: bind-users@lists.isc.org
Subject: Re: Lots of "RSA_verify failed" after upgrade to 9.7.7
Message-ID: <1364786722.6226.2.camel@tardis>
Content-Type: text/plain; charset="utf-8"

On Mon, 2012-11-05 at 21:21 +1100, Mark Andrews wrote:


> 
> Ignore them.  They will be addressed in the next maintenance release.
>  


it was, but now seems to have reared its ugly head again in 9.9.2-p2

Apr  1 12:20:35 fox named[589]: RSA_verify failed Apr  1 12:20:35 fox 
named[589]: error:04077068:rsa routines:RSA_verify:bad signature:rsa_sign.c:263:
Apr  1 12:20:35 fox named[589]: RSA_verify failed Apr  1 12:20:35 fox 
named[589]: error:04077068:rsa routines:RSA_verify:bad signature:rsa_sign.c:263:

-- next part --
An HTML attachment was scrubbed...
URL: 
<https://lists.isc.org/pipermail/bind-users/attachments/20130401/8e3de249/attachment-0001.html>
-- next part --
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part
URL: 
<https://lists.isc.org/pipermail/bind-users/attachments/20130401/8e3de249/attachment-0001.bin>

--

Message: 3
Date: Mon, 01 Apr 2013 15:03:47 +1100
From: Mark Andrews 
To: Noel Butler 
Cc: bind-us...@isc.org
Subject: Re: Lots of "RSA_verify failed" after upgrade to 9.7.7
Message-ID: <20130401040348.15e9531b7...@drugs.dv.isc.org>


In message <1364786722.6226.2.camel@tardis>, Noel Butler writes:
> 
> On Mon, 2012-11-05 at 21:21 +1100, Mark Andrews wrote:
> 
> 
> > 
> > Ignore them.  They will be addressed in the next maintenance release.
> >  
> 
> 
> it was, but now seems to have reared its ugly head again in 9.9.2-p2
> 
> Apr  1 12:20:35 fox named[589]: RSA_verify failed Apr  1 12:20:35 fox 
> named[589]: error:04077068:rsa routines:RSA_verify:bad 
> signature:rsa_sign.c:263:
> Apr  1 12:20:35 fox named[589]: RSA_verify failed Apr  1 12:20:35 fox 
> named[589]: error:04077068:rsa routines:RSA_verify:bad 
> signature:rsa_sign.c:263:

BIND 9.7.7 and BIND 9.9.2 were both released at the same time (Oct 9, 2012).

BIND 9.9.2-P1 and BIND 9.9.2-P2 are security releases.

The betas of the next maintenance release 9.9.3b1 and 9.9.3b2 contain the fix.

Mark
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


--

Message: 4
Date: Mon, 01 Apr 2013 16:14:46 +1000
From: Noel Butler 
To: Mark Andrews 
Cc: bind-us...@isc.org
Subject: Re: Lots of "RSA_verify failed" after upgrade to 9.7.7
Message-ID: <1364796886.6226.6.camel@tardis>
Content-Type: text/plain; charset="utf-8"

On Mon, 2013-04-01 at 15:03 +1100, Mark Andrews wrote:

> In message <1364786722.6226.2.camel@tardis>, Noel Butler writes:
> > 
> > On Mon, 2012-11-05 at 21:21 +1100, Mark Andrews wrote:
> > 
> > 
> > > 
> > > Ignore them.  They will be addressed in the next maintenance release.
> > >  
> > 
> > 
> > it was, but now seems to have reared its ugly head again in 9.9.2-p2
> > 
> > Apr  1 12:20:35 fox named[589]: RSA_verify failed
> > Apr  1 12:20:35 fox named[589]: error:04077068:rsa
> > routines:RSA_verify:bad signature:rsa_sign.c:263:
> > Apr  1 12:20:35 fox named[589]: RSA_verify failed
> > Apr  1 12:20:35 fox named[589]: error:04077068:rsa
> > routines:RSA_verify:bad signature:rsa_sign.c:263:
> 
> BIND 9.7.7 and BIND 9.9.2 were both released at the same time (Oct
> 9, 2012).
> 
> BIND 9.9.2-P1 and BIND 9.9.2-P2 are security releases.
> 
> The betas of

Auto-dnssec maintain and 'continous' resigning

2013-04-01 Thread Carlos M. Martinez
Hello all,

I have a few zones signed with DNSSEC and "autodnssec maintain". I have
one particular zone that every now and then (I'm working on finding a
pattern or trigger)

This re-signing process runs for a while, incrementing the serial each
time and growing the journal until stopping.

I know I need to do more legwork here, but I would appreciate any
heads-up on this particular problem.

Warm regards,

~Carlos
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Dynamic Update Policy.....

2013-04-01 Thread Gary Greene
From: Chris Buxton [cli...@buxtonfamily.us]
Sent: Saturday, March 30, 2013 08:23 PM
To: Gary Greene
Cc: bind-users@lists.isc.org
Subject: Re: Dynamic Update Policy.

> On Mar 28, 2013, at 4:03 PM, Gary Greene wrote:
>
>> I'm trying to get bind to use ddns updates for our environment, however I'm 
>> getting errors in the logs on the
>> system that the host is being denied from making the changes.
>>
>> Currently, I'm only allowing certain hosts to update their records, as a 
>> test.
>>
>> The stanza for update-policy follows:
>>
>> zone "minervanetworks.com" {
>> type master;
>> notify yes;
>> update-policy {
>> grant ggreene-imac$@MINERVANETWORKS.COM ms-self * A;
>> grant cvallejo-w7-lt$@MINERVANETWORKS.COM ms-self * A;
>> grant cvallejo-test-w7-lt$@MINERVANETWORKS.COM ms-self * A;
>> };
>> file "/etc/named.d/minervanetworks.zone";
>> check-names ignore;
>> };
>>
>> The error I see in the logs:
>> Mar 28 15:57:29 ns1 named[11482]: client 10.5.1.11#52418: view internal: 
>> update 'minervanetworks.com/IN' 
>> denied
> 
> That log message is normal.
>
> If you want to use GSS-TSIG, that's not going to work. I don't have a 
> complete step-by-step of what's required, but 
> at a minimum:
>
> - Don't use ms-self.
> - Do create a user account in AD with a service principal name that matches 
> the hostname of the master name 
> server as advertised in the SOA and NS records, prefixed by "DNS/". For 
> example, 
> "DNS/ns1.minervanetworks@minervanetworks.com". Without this, GSS-TSIG 
> will not be attempted.
> - Do not be concerned by the denied update. Every attempt to update will go 
> something like this:
>
> 1. SOA query for name to be updated, to recursion server.
> 2. Address lookup for server listed in SOA record, to recursion server.
> 3. Insecure DDNS update message to server listed in SOA record. [denied]
> 4. TKEY query to server listed in SOA record, to establish a single-use 
> shared key.
> 5. Signed update message to server listed in SOA record. [approved or denied, 
> according to policy]
>
>> The reverse zones work, as they are setup to allow dhcpd to make the changes 
>> (and they work correctly), 
>> however the forward zone does not.
>
> At a guess, you're not using GSS-TSIG for reverse record updates, correct?

That is correct. I'm just using normal TSIG pre-genned keys for the reverse 
zones handled by dhcpd.

> Is there a reason not to have DHCP update the host records as well as the 
> reverse?

The overriding reason that we wish to use GSS-TSIG is because we have a number 
of devices on the network we _don't_ want in DNS (iPads, iPhones, Android 
devices, etc.) that all get their IP info from the same DHCP server. Internally 
(and externally) most devices use only the minervanetworks.com domain, with 
rare sub-domain exceptions. While it would likely be good to move some stuff to 
a sub-domain, doing so would pose significant work (moving hosts to a subdomain 
in AD is not trivial.)

I was hoping to get ms-self to work, as it seemed it would require the least 
amount of work over all

--
Gary L. Greene, Jr.
Sr. Systems Administrator
IT Operations
Minerva Networks, Inc.
Cell: (650) 704-6633

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Auto-dnssec maintain and 'continous' resigning

2013-04-01 Thread Carlos M. Martinez
Reframing the question in more general terms... Which events trigger a
zone re-sign and reload when using "auto-dnssec maintain" ?

regards,

~Carlos

On 4/1/13 12:04 PM, Carlos M. Martinez wrote:
> Hello all,
> 
> I have a few zones signed with DNSSEC and "autodnssec maintain". I have
> one particular zone that every now and then (I'm working on finding a
> pattern or trigger)
> 
> This re-signing process runs for a while, incrementing the serial each
> time and growing the journal until stopping.
> 
> I know I need to do more legwork here, but I would appreciate any
> heads-up on this particular problem.
> 
> Warm regards,
> 
> ~Carlos
> 
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.8.2: forward zone not working

2013-04-01 Thread Kevin Darcy

On 3/19/2013 8:30 PM, Gerry Reno wrote:

On 03/19/2013 08:10 PM, b...@bitrate.net wrote:

On Mar 18, 2013, at 23.04, Gerry Reno  wrote:


On 03/18/2013 10:25 PM, b...@bitrate.net wrote:

On Mar 18, 2013, at 20.27, Gerry Reno  wrote:


Using BIND 9.8.2

When you setup Samba 4 AD DC using BIND9_DLZ and your domain has external 
servers (eg: www,mail) at external providers
this means that the ISP and the internal network nameservers will both have SOA 
record for the domain.

it's not really anything particularly related to samba or dlz.  it's just two different 
computers serving the same zone.  you're just "hijacking" or overloading that 
particular label.  in addition to declaring the zone in your config, you'll need to 
delegate that new zone from the parent.

it's worth noting that this scales poorly.  having to add delegations and zone 
declarations for every label for which this is desired becomes quickly 
prohibitive.  instead, i'd suggest using a subdomain for samba - e.g. something 
like ad.example.com.  there are a number of other solutions as well which would 
likely be more sensible than hijacking labels.

-ben


If it was more than just a few labels I would do it another way.

But this will suffice, if I can only get bind to actually get the forward zone 
working.

I don't need any delegation.  I'm not looking to slave the zone.

as i said, you'll need to delegate that new zone from the parent.  i'm not sure 
what slaves zones would have to do with that.

As I said, if I was going to do this for a bunch of labels I would add an 
external view and just slave it from the ISP
which holds the SOA for the external answers.

And sure delegation works.  You don't even need a forward zone.

So what exactly is the use case for this forward zone?
If you can achieve what you want through delegation alone, and unless 
you think that you can squeeze out a performance benefit by forwarding 
to a "rich cache", then yeah, there is no compelling use case for 
forwarding and you shouldn't do it. Selective forwarding is most 
commonly employed when you can't talk directly to the authoritative 
nameservers for the zone and need to go through an intermediate resolver.



I see a number of postings over several y ears where people
have not been able to get the forward zone working.

Probably because they don't follow the simple advice to delegate the zone.

- Kevin

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Forward First on Master Zone (bypass SOA)

2013-04-01 Thread Kevin Darcy

On 3/29/2013 12:09 AM, Doug Barton wrote:

On 03/28/2013 12:28 PM, Ben-Eliezer, Tal (ITS) wrote:
My organization is evaluating the use of split-view DNS in our 
environment.


Simple ... don't do it. It's almost never the right answer, and as 
you're learning carries with it more administrative overhead than the 
problems it's designed to solve.


Much better to spend the time carefully considering what your goals 
are, and finding other ways to reach them.
And your alternative is what? Run the external version of the namespace 
on a completely separate infrastructure from the internal version?


My personal preference is to make the upfront investment in developing a 
split-view config and then pay less in hardware and maintenance costs 
(in terms of the vendor and my own staff) in the long term, because I 
have fewer nameservers to procure and manage. Of course, I'm a little 
biased, since I've *already* developed that config, which rarely 
requires tinkering, so the hardware and maintenance savings are just 
gravy. For someone just starting out, the cost/benefit decision might be 
a little tougher, especially if they're not experienced with BIND 
configuration, and thus might cause a lot of 
drama/nail-biting/disruption until they get it right.


- Kevin


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND cannot load backup of slaved root zone

2013-04-01 Thread Kevin Morgan
Steps to reproduce:
1.Delete or move root.zone out of the bind directory if it exists.
1.Slave the root zone by adding the following to named.conf:
zone "." {
  type slave;
  file "root.zone";
  notify no;
  masters{192.0.32.140; 192.0.47.140; };
};
2.Restart BIND
3.restart BIND again

Unexpected results:
BIND cannot load backup of slaved root zone as shown by the following
warnings in the logfile:
general: error: dns_master_load: out of range
general: error: zone ./IN: loading from master file root.zone failed:
out of range
general: info: zone 0.0.127.in-addr.arpa/IN: loaded serial 1997022700
general: warning: zone ./IN: unable to load from 'root.zone'; renaming
file to 'db-5784' for failure analysis and retransferring.


Expected results:
BIND should be able to reload the backup zone file.

--
Kevin Morgan
PGP Public Key ID 0xB6028066
Key fingerprint = 09FB 59EB D9FE 7C9C 12DF  9530 A877 FAB7 B602 8066
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Forward First on Master Zone (bypass SOA)

2013-04-01 Thread Mike Hoskins (michoski)
-Original Message-

From: Kevin Darcy 
Date: Monday, April 1, 2013 2:46 PM
To: "bind-users@lists.isc.org" 
Subject: Re: Forward First on Master Zone (bypass SOA)

>On 3/29/2013 12:09 AM, Doug Barton wrote:
>> On 03/28/2013 12:28 PM, Ben-Eliezer, Tal (ITS) wrote:
>>> My organization is evaluating the use of split-view DNS in our
>>> environment.
>>
>> Simple ... don't do it. It's almost never the right answer, and as
>> you're learning carries with it more administrative overhead than the
>> problems it's designed to solve.
>>
>> Much better to spend the time carefully considering what your goals
>> are, and finding other ways to reach them.
>And your alternative is what? Run the external version of the namespace
>on a completely separate infrastructure from the internal version?

Wouldn't you do that to some extent anyway, to separate external infra --
which I'd think is authoritative only -- and internal which is likely a
mix of authoritative and recursive?

I guess we've overkilled...We're running a split-horizon config on
separate infrastructure.

There has always been those for and against split horizon.  I often flip
back and forth since I see logic in many of the arguments on both sides.
When I usually hear people speak against split-horizon it has to do with
added complexity and minimal benefit (can be harder to debug, confusing to
new admins, internal resources should rely on more than DNS for protection
and leak out in a lot of ways beside DNS, etc).  They generally advocate
converging the namespace itself more than dictating what the
infrastructure should look like.  You could have a cohesive name space
served from separate infra or common infra using views and ACLs to decide
who can access the cache.  I would envision a hidden master feeding both
sets of infra so maintenance is still centralized.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Auto-dnssec maintain and 'continous' resigning

2013-04-01 Thread Alan Clegg

On Apr 1, 2013, at 2:36 PM, Carlos M. Martinez  wrote:

> Reframing the question in more general terms... Which events trigger a
> zone re-sign and reload when using "auto-dnssec maintain" ?


Obvious ones:   modifications to the dynamic zone

Less obvious ones:   key events (publication/activation/inactivation/deletion)
 signature nearing-expiration

AlanC
-- 
Alan Clegg | +1-919-355-8851 | a...@clegg.com

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


DLZ $client% parameter segfault

2013-04-01 Thread Michael McConnell
Hello All,

I am trying to use Bind 9.9.2-P2 with the DLZ module, however I continue to run 
into segfault issues when trying to use $client$

{SELECT SQL_CACHE zone_name FROM dns_zones … }
{{select zone_ttl AS ttl …. WHERE geo_ip LIKE '$client$'}

I am trying to user $client$ in the A record lookup, not the zone transfer. Is 
this possible?

Thanks so much,
Michael

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Does 9.9.2-P2 support rate-limit configuration?

2013-04-01 Thread Red Cricket
Hi,

Does 9.9.2-P2 (the recent release that fixes
CVE-2013-2266: A Maliciously Crafted Regular Expression Can Cause Memory
Exhaustion in named)
support rate-limit ? If not is there a way to patch the source code to
allow for rate-limiting?

Thanks
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Does 9.9.2-P2 support rate-limit configuration?

2013-04-01 Thread Vernon Schryver
> From: Red Cricket 

> Does 9.9.2-P2 (the recent release that fixes
> CVE-2013-2266: A Maliciously Crafted Regular Expression Can Cause Memory
> Exhaustion in named)
> support rate-limit ?

not without patching.

>  If not is there a way to patch the source code to
> allow for rate-limiting?

Yes, there are 12 more patches for 9.9.2-P2 and 9.8.4-P2 in the usual place.
That place can be found by following the link labeled "Patch files for BIND9"
on http://www.redbarn.org/dns/ratelimits 

Two of the new patches are copies with names that includd the version
string for the FreeBSD ports.


Vernon Schryverv...@rhyolite.com
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DLZ $client% parameter segfault

2013-04-01 Thread Michael McConnell
The $client$ parameter appears to work for zone transfers, as per this example 
https://github.com/opennetadmin/ona/wiki/bind-dlz
However if I use $client$ on any other queries bind segfaults.

Strace doesn't seem to show anything useful...

Ideas?

Thanks again,
Mike

On Apr 1, 2013, at 2:51 PM, Michael McConnell  wrote:

> Hello All,
> 
> I am trying to use Bind 9.9.2-P2 with the DLZ module, however I continue to 
> run into segfault issues when trying to use $client$
> 
> {SELECT SQL_CACHE zone_name FROM dns_zones … }
> {{select zone_ttl AS ttl …. WHERE geo_ip LIKE '$client$'}
> 
> I am trying to user $client$ in the A record lookup, not the zone transfer. 
> Is this possible?
> 
> Thanks so much,
> Michael
> 
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users