Re: A policy for removing named.conf options.

2019-07-07 Thread Timothe Litt

On 13-Jun-19 06:46, Matthijs Mekking wrote:
> Dear BIND 9 users,
>
> BIND 9 has a lot of configuration options.  Some have lost value over
> the years, but the policy was to keep the options to not break old
> configurations.
>
> However, we also want to clean up the code at some point.  Keeping these
> options increases the number of corner cases and makes maintenance more
> cumbersome.  It can also be confusing to new users.  We are trying to
> establish an orderly, staged process that gives existing users ample
> time to react and adapt to deprecated options.
>
> The policy below describes our proposal for the procedure for removing
> named.conf options. We would like to hear your feedback.
>
> Thanks, best regards,
>
> Matthijs
> [Snip]

Slowly catching-up from being off-line, I've reviewed the discussion on
this.  A couple of observations:

So far, the suggestions have included logging & making sure that
named-checkconf flags deprecated syntax.  While helpful, these all
suffer from a timing problem: notice is only provided after the new
software is installed.  For advance notification, they require someone
to look at "the" log file (or proactively run named-checkconf).  But if
it isn't going to bite now, there's a good chance that won't happen. 
And if it does bite now, the software has been installed - best case in
a test environment, worst case in production.  [The last may be more
likely with packaged distributions than with build-from source sites.] 
Further, "the" log file varies by startup mechanism (sysVinit, systemd,
named's logs, consoles, ...) - and in embedded cases, logs may be remote
and/or hard to access.

One approach to notification that hasn't been mentioned would be to
include a deprecation notice and scan of the default configuration file
in 'make install'.   This should be a separate script called from
install, that can also be used stand-alone.

This has limitations, but covers some interesting cases:

Advantages:

Proactive: can stop install if obsolete directives/syntax is detected -
before starting the test (or for the adventurous, production) environment.

Does not depend on logging, or on anyone reading the logs.

Does not depend on which startup mechanism is in use.

Should be caught by the packagers' build.  They are generally
responsible enough to pass on the deprecations to their users.  The
packagers can run the check script in their package's 'install' mechanism.

Works for most people who build from source.

Limitations:

Does not work for installations who use a non-default configuration
file. (e.g. named -c ...)

May be messy for chroot and enhanced security (selinux,apparmor,...)
environments

Will not inspect dynamic configurations (e.g. rndc addzone, modzone...)

Notes:

In all cases, make install could include a short notice of the form "See
DEPRECATIONS for changes that may require changes in your
configuration files".   The README can also refer to this file to avoid
duplication.

Why install?  Eventually, even packaged distributions use install - it
may be buried in an RPM's spec file, but it's run somewhere.  Install
allows the newly built(or distributed) version to check before the new
version is activated.  "configure" is too soon - you don't have the new
images, and with packaged (and cross-compiled) distributions, it's never
run on the target.

Probably, running the check should be the default (maximum coverage),
but a make install-nocheck target would probably be necessary.

Another mechanism would be to add a --fix option to named-checkconf. 
This would generate a new file(s), commenting out options that no longer
serve a purpose - with an easily detectable marker (e.g. '# OBSOLETE -
named-checkconf V19.2').  For options that are simply renamed, it can
insert the new, equivalent syntax.  For options that can't be
automatically updated, create a marker "# ATTENTION: named-checkconf
V19.2 - The 'use-Klingon-names' option is not supported, see
DEPRECATIONS section 659.712 for details" - and don't comment out the
option!  A log file listing all files modified should be produced. 
--fix would shift the burden of finding the affected options from the
user to software - making it (a) more likely to happen (b) easier -
especially for configurations that span dozens (or hundreds) of
'include'd files.

I don't think there's a single universal solution to handling
deprecations, but I hope that these observations are helpful.


Timothe Litt
ACM Distinguished Engineer
--
This communication may not represent the ACM or my employer's views,
if any, on the matters discussed. 




signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-14 Thread Stacey Marshall

On 13 Jun 2019, at 13:37, Lightner, Jeffrey wrote:

I'd suggest also giving warnings for deprecated options when running 
named-checkconf (and named-checkzone if applicable).   You mention the 
logs but not the commands.


Jeffrey C. Lightner
Sr. UNIX/Linux Administrator




With named-checkconf and named-checkzone warning about future
deprecation ahead of time, startup scripts could perhaps implement
checks.  Perhaps an exit code could signify the issue, and or have the
messages follow a standard format for easy testing of output.
Allowing SMF / systemd to then show the service as degraded.

ESV release could have the tools updated in micro release to provide
early warnings; for those that update to the later releases at least.


Mr. Stacey Marshall - Principal Software Engineer - Oracle UK
Oracle Systems, SPARC & Solaris System Software Engineering.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread @lbutlr
On 13 Jun2019, at 17:48, Browne, Stuart via bind-users 
 wrote:
> For options that have passed their warning phase and have been removed, I'm 
> all for BIND failing to start and named-checkconf erroring out , rather than 
> quietly ignoring them.

Yes, I think this is the best way, otherwise there will be useless kruft 
getting in the way forever.


-- 
The only way of discovering the limits of the possible is to venture a
little way past them into the impossible.


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: A policy for removing named.conf options.

2019-06-13 Thread Browne, Stuart via bind-users



> -Original Message-
> From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of
> Evan Hunt
> Sent: Friday, 14 June 2019 5:40 AM
> To: Warren Kumari
> Cc: Ondřej Surý; comp-protocols-dns-b...@isc.org
> Subject: Re: A policy for removing named.conf options.
> 
> On Thu, Jun 13, 2019 at 02:52:34PM -0400, Warren Kumari wrote:
> > all sorts of annoyance -- if I'm running low on space for cache, and
> > spend much time twiddling the "max-acache-size" knob before
> > discovering that someone has simply snipped the wires to it, I'd be
> > super-grumpy.
> 
> But hopefully in this scenario you're paying attention to log messages,
> and would have seen the "obsolete option" warning.
> 
> The question is, should your nameserver complain and keep running, or
> should it reufse to run? And for "max-acache-size", enh, I'd probably
> be okay with it.
> 
> But a standard policy that covers all deprecated options would need
> to be stricter than "enh".

For options that have passed their warning phase and have been removed, I'm all 
for BIND failing to start and named-checkconf erroring out , rather than 
quietly ignoring them.

Usless cruft is useless. You're going to the trouble of doing a 
major-version-upgrade, take the time to tune the config to suit it.

If you're using automation tools, hopefully you've run it through at least one 
test system before hitting production, yes?

Stuart

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Evan Hunt
On Thu, Jun 13, 2019 at 02:52:34PM -0400, Warren Kumari wrote:
> all sorts of annoyance -- if I'm running low on space for cache, and
> spend much time twiddling the "max-acache-size" knob before
> discovering that someone has simply snipped the wires to it, I'd be
> super-grumpy.

But hopefully in this scenario you're paying attention to log messages,
and would have seen the "obsolete option" warning.

The question is, should your nameserver complain and keep running, or
should it reufse to run? And for "max-acache-size", enh, I'd probably
be okay with it.

But a standard policy that covers all deprecated options would need
to be stricter than "enh".

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Warren Kumari
One of the Tesla easter-eggs is that the radio volumes goes to 11...

:-P
W

On Thu, Jun 13, 2019 at 3:27 PM Lightner, Jeffrey
 wrote:
>
> But if the knob goes to 11 you'll know it is superior to those that only go 
> to 10.  :-)
>
>
> -Original Message-
> From: bind-users  On Behalf Of Warren Kumari
> Sent: Thursday, June 13, 2019 2:53 PM
> To: Evan Hunt 
> Cc: Ondřej Surý ; comp-protocols-dns-b...@isc.org
> Subject: Re: A policy for removing named.conf options.
>
> On Thu, Jun 13, 2019 at 2:43 PM Evan Hunt  wrote:
> >
> > > > Is it really much of a hassle to leave the obsolete options in the
> > > > parser, but just ignore them?
> >
> > IMHO, it depends on the option. For something like "managed-keys" and
> > "trusted-keys", there are clear security implications.  Once those are
> > no longer effective, it would be dangerous to have named ignore them -
> > even with a logged warning. Operators who didn't notice the log
> > message wouldn't realize they were running without the security they'd 
> > configured.
> >
> > For something like "cleaning-interval" or "max-acache-size", IMHO it
> > would be safe to let it slide. With "dnssec-enable" or
> > "queryport-pool-ports", maybe those fall somewhere in between, I could see 
> > arguments either way.
>
> I personally think that while it may or may not be a hassle to have the 
> parser ignore them, it would be a significant operational risk / annoyance.
> Having knobs which you can twiddle which don't do anything leads to all sorts 
> of annoyance -- if I'm running low on space for cache, and spend much time 
> twiddling the "max-acache-size" knob before discovering that someone has 
> simply snipped the wires to it, I'd be super-grumpy.
>
> I'm expecting some issues when knobs get deprecated (and I'm likely to run 
> into a few lurking in old configs which have grown over time), but I'd rather 
> have named not start just after I've upgraded it than be running in some 
> partially undefined state.
>
> W
>
> >
> > In any case, if we're going to make a policy that covers the whole
> > range of possibilities, then it needs to address the case when an
> > option must removed, and how to ensure operators aren't blindsided by that.
> >
> > --
> > Evan Hunt -- e...@isc.org
> > Internet Systems Consortium, Inc.
> > ___
> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> > unsubscribe from this list
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad idea in 
> the first place.
> This is like putting rabid weasels in your pants, and later expressing regret 
> at having chosen those particular rabid weasels and that pair of pants.
>---maf
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: A policy for removing named.conf options.

2019-06-13 Thread Lightner, Jeffrey
But if the knob goes to 11 you'll know it is superior to those that only go to 
10.  :-)


-Original Message-
From: bind-users  On Behalf Of Warren Kumari
Sent: Thursday, June 13, 2019 2:53 PM
To: Evan Hunt 
Cc: Ondřej Surý ; comp-protocols-dns-b...@isc.org
Subject: Re: A policy for removing named.conf options.

On Thu, Jun 13, 2019 at 2:43 PM Evan Hunt  wrote:
>
> > > Is it really much of a hassle to leave the obsolete options in the 
> > > parser, but just ignore them?
>
> IMHO, it depends on the option. For something like "managed-keys" and 
> "trusted-keys", there are clear security implications.  Once those are 
> no longer effective, it would be dangerous to have named ignore them - 
> even with a logged warning. Operators who didn't notice the log 
> message wouldn't realize they were running without the security they'd 
> configured.
>
> For something like "cleaning-interval" or "max-acache-size", IMHO it 
> would be safe to let it slide. With "dnssec-enable" or 
> "queryport-pool-ports", maybe those fall somewhere in between, I could see 
> arguments either way.

I personally think that while it may or may not be a hassle to have the parser 
ignore them, it would be a significant operational risk / annoyance.
Having knobs which you can twiddle which don't do anything leads to all sorts 
of annoyance -- if I'm running low on space for cache, and spend much time 
twiddling the "max-acache-size" knob before discovering that someone has simply 
snipped the wires to it, I'd be super-grumpy.

I'm expecting some issues when knobs get deprecated (and I'm likely to run into 
a few lurking in old configs which have grown over time), but I'd rather have 
named not start just after I've upgraded it than be running in some partially 
undefined state.

W

>
> In any case, if we're going to make a policy that covers the whole 
> range of possibilities, then it needs to address the case when an 
> option must removed, and how to ensure operators aren't blindsided by that.
>
> --
> Evan Hunt -- e...@isc.org
> Internet Systems Consortium, Inc.
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
> unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



--
I don't think the execution is relevant when it was obviously a bad idea in the 
first place.
This is like putting rabid weasels in your pants, and later expressing regret 
at having chosen those particular rabid weasels and that pair of pants.
   ---maf
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Warren Kumari
On Thu, Jun 13, 2019 at 2:43 PM Evan Hunt  wrote:
>
> > > Is it really much of a hassle to leave the obsolete options in the
> > > parser, but just ignore them?
>
> IMHO, it depends on the option. For something like "managed-keys" and
> "trusted-keys", there are clear security implications.  Once those are no
> longer effective, it would be dangerous to have named ignore them - even
> with a logged warning. Operators who didn't notice the log message wouldn't
> realize they were running without the security they'd configured.
>
> For something like "cleaning-interval" or "max-acache-size", IMHO it would
> be safe to let it slide. With "dnssec-enable" or "queryport-pool-ports",
> maybe those fall somewhere in between, I could see arguments either way.

I personally think that while it may or may not be a hassle to have
the parser ignore them, it would be a significant operational risk /
annoyance.
Having knobs which you can twiddle which don't do anything leads to
all sorts of annoyance -- if I'm running low on space for cache, and
spend much time twiddling the "max-acache-size" knob before
discovering that someone has simply snipped the wires to it, I'd be
super-grumpy.

I'm expecting some issues when knobs get deprecated (and I'm likely to
run into a few lurking in old configs which have grown over time), but
I'd rather have named not start just after I've upgraded it than be
running in some partially undefined state.

W

>
> In any case, if we're going to make a policy that covers the whole range of
> possibilities, then it needs to address the case when an option must
> removed, and how to ensure operators aren't blindsided by that.
>
> --
> Evan Hunt -- e...@isc.org
> Internet Systems Consortium, Inc.
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Evan Hunt
> > Is it really much of a hassle to leave the obsolete options in the 
> > parser, but just ignore them?

IMHO, it depends on the option. For something like "managed-keys" and
"trusted-keys", there are clear security implications.  Once those are no
longer effective, it would be dangerous to have named ignore them - even
with a logged warning. Operators who didn't notice the log message wouldn't
realize they were running without the security they'd configured.

For something like "cleaning-interval" or "max-acache-size", IMHO it would
be safe to let it slide. With "dnssec-enable" or "queryport-pool-ports",
maybe those fall somewhere in between, I could see arguments either way.

In any case, if we're going to make a policy that covers the whole range of
possibilities, then it needs to address the case when an option must
removed, and how to ensure operators aren't blindsided by that.

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Ondřej Surý

> On 13 Jun 2019, at 18:10, John Thurston  wrote:
> 
> On 6/13/2019 4:37 AM, Lightner, Jeffrey wrote:
>> I'd suggest also giving warnings for deprecated options when running 
>> named-checkconf (and named-checkzone if applicable).   You mention the logs 
>> but not the commands.
>> Jeffrey C. Lightner
>> Sr. UNIX/Linux Administrator
> 
> I hope this is implemented in named-checkconf/zone.
> 
> It would also be nice to include some sort of option on named-checkconf to 
> 'whitelist' or ignore the deprecation warnings, as I use named-checkconf two 
> different ways.

"--no-deprecated”-like option is a nice idea, I like it. Thanks!

--
Ondřej Surý
ond...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Ondřej Surý

> On 13 Jun 2019, at 17:55, Barry Margolin  wrote:
> 
> In article ,
> Matthijs Mekking  wrote:
> 
>> ## Deprecating
>> 
>> A configuration option that is candidate for removal will be deprecated
>> first.  During this phase the option will still work, but we will be
>> communicating to users that the option is going to be removed soon. A
>> user that has deprecated options configured will see warnings in their
>> logs and needs to take action to get rid of those log messages.
>> Configuration options that are deprecated will be identified in the
>> Release Note for the release they are deprecated in.
> 
> As others have said, I'm not sure how effective this will be. I suspect 
> most people don't check the logs routinely, only when something goes 
> wrong.

The policy isn’t intended to take care of people who don’t really care. The
policy is here to have a transparent and careful way how to remove options.

> Is it really much of a hassle to leave the obsolete options in the 
> parser, but just ignore them?

Unfortunately, yes, it adds to overall entropy of the source code, and we aim
to fix the cruft that has accumulated in last 20 years. This is more of high
level design decision, but it is something that has to be done because it is
connected with maintenance burden. And it’s a burden we don’t have to really
carry on our shoulders.

Ondrej
--
Ondřej Surý
ond...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread John Thurston

On 6/13/2019 4:37 AM, Lightner, Jeffrey wrote:

I'd suggest also giving warnings for deprecated options when running 
named-checkconf (and named-checkzone if applicable).   You mention the logs but 
not the commands.

Jeffrey C. Lightner
Sr. UNIX/Linux Administrator


I hope this is implemented in named-checkconf/zone.

It would also be nice to include some sort of option on named-checkconf 
to 'whitelist' or ignore the deprecation warnings, as I use 
named-checkconf two different ways.


When I'm setting up a server, or making a configuration change, I use it 
interactively. In this case, I would love to know if an option I'm 
trying to use is going away.


I have automated deployment processes which call named-checkconf. In 
most of these cases, I only need to know that my .conf is valid even if 
it isn't optimal. I'll uncover the warnings with my next interactive 
work, but I don't want my automated processes to stop working because 
something will be going away at some point in the near future.


--
   Do things because you should, not just because you can.

John Thurston907-465-8591
john.thurs...@alaska.gov
Department of Administration
State of Alaska
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Barry Margolin
In article ,
 Matthijs Mekking  wrote:

> ## Deprecating
> 
> A configuration option that is candidate for removal will be deprecated
> first.  During this phase the option will still work, but we will be
> communicating to users that the option is going to be removed soon. A
> user that has deprecated options configured will see warnings in their
> logs and needs to take action to get rid of those log messages.
> Configuration options that are deprecated will be identified in the
> Release Note for the release they are deprecated in.

As others have said, I'm not sure how effective this will be. I suspect 
most people don't check the logs routinely, only when something goes 
wrong.

Is it really much of a hassle to leave the obsolete options in the 
parser, but just ignore them?

-- 
Barry Margolin
Arlington, MA
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread G.W. Haywood via bind-users

Hi there,

On Thu, 13 Jun 2019, Leroy Tennison wrote:

On Thu, 13 Jun 2019, Ond?ej Sur? wrote:

On 13 Jun 2019, at 15:55, G.W. Haywood via bind-users ... wrote:


... could you not set up an ISC zone which BIND on startup will ping ...


we?ve been discussing the ?call home? feature on several occasions
and usually something more pressing crawls at top of the TODO list...


Unconditional "call home" is always problematic ...


Sure.


... administrative hassle ... management approval ...


Hence the "ask for permission at build time, etc.".  Just Say No.


We would be happy to collect more feedback and don?t get me started
on how I just love to receive patches, preferably as merge requests
(ping me if you need up the projects limit in our GitLab) ;).


Unfortunately I also have one of those TODO lists, and I'm afraid it
has no room for patching BIND although I'd relish the opportunity.  I
did have a quick look and it doesn't look too daunting.

--

73,
Ged.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Leroy Tennison
Unconditional "call home" is always problematic but discretionary "call home" 
(per the URL) is much better.  However, be aware that some environments (such 
as Payment Card Industry standards) require that all outbound traffic have a 
business justification.  This could be justified, it's just going to be an 
administrative hassle to document the need and go through a management approval 
process.


From: bind-users  on behalf of Ondřej Surý 

Sent: Thursday, June 13, 2019 9:22:53 AM
To: G.W. Haywood
Cc: bind-users@lists.isc.org
Subject: [EXTERNAL] Re: A policy for removing named.conf options.

Hey,

we’ve been discussing the “call home” feature on several occasions and usually 
something
more pressing crawls at top of the TODO list, but here’s the issue we have as a 
starter:

https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fgitlab.isc.org%2fisc-projects%2fbind9%2fissues%2f421&c=E,1,5RfyTpYfPh7xliqVD4MiTRmekNfpBmTXzQmVptTqjqm1ew4vcDjQwzkKiVAlJhtyT_HqrdNmh4vqy-Umg9NGAUvDh_3a7EB7SlLtOH6OKbxmhCUZxrp9n8zD&typo=1

We would be happy to collect more feedback and don’t get me started on how I 
just love
to receive patches, preferably as merge requests (ping me if you need up the 
projects limit
in our GitLab) ;).

Ondrej
--
Ondřej Surý
ond...@isc.org

&g

Harriscomputer

Leroy Tennison
Network Information/Cyber Security Specialist
E: le...@datavoiceint.com


[cid:Data-Voice-International-LOGO_aa3d1c6e-5cfb-451f-ba2c-af8059e69609.PNG]


2220 Bush Dr
McKinney, Texas
75070
www.datavoiceint.com<http://www..com>


This message has been sent on behalf of a company that is part of the Harris 
Operating Group of Constellation Software Inc. These companies are listed 
here<http://subscribe.harriscomputer.com/>.

If you prefer not to be contacted by Harris Operating Group please notify 
us<http://subscribe.harriscomputer.com/>.



This message is intended exclusively for the individual or entity to which it 
is addressed. This communication may contain information that is proprietary, 
privileged or confidential or otherwise legally exempt from disclosure. If you 
are not the named addressee, you are not authorized to read, print, retain, 
copy or disseminate this message or any part of it. If you have received this 
message in error, please notify the sender immediately by e-mail and delete all 
copies of the message.





t; On 13 Jun 2019, at 15:55, G.W. Haywood via bind-users 
 wrote:
>
> Hello again,
>
> On Thu, 13 Jun 2019, Matthijs Mekking wrote:
>> On 6/13/19 2:40 PM, G.W. Haywood via bind-users wrote:
>> > On Thu, 13 Jun 2019, Matthijs Mekking? wrote:
>> >
>> > > | managed-keys?? | 9.15/9.16 | replaced with dnssec-keys |
>> >
>> > According to my changelogs for 'named.conf I removed 'managed-keys' and
>> > 'trusted-keys' three years ago, but still use 'managed-keys-directory'.
>> ... it is likely that you are using managed trust anchors that
>> are configured with 'managed-keys' in a bind.keys file. ...
>
> Correct.  It says in that file that I'm not expected to do anything to
> it - so I expect you'll take care of that when the time comes, yes?
>
> To tell you about the use of configuration options, could you not set
> up an ISC zone which BIND on startup will ping with a few packets?
> You'd get a lot more (and more accurate) feedback than sending out a
> plea on a mailing list.  You could make it a compile time option, ask
> for permission at build time, etc..
>
> --
>
> 73,
> Ged.
> ___
> Please visit 
> https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,CqxGXQ1aiGLDV9LxLwljfYJRolmwJV3RlfcYaNABVsMlBnR5RJRsa2BaKR3xs-G5eFTxIA841AhYXTegjj-ggT2H9TJqOoJb18sEG8eenJz3jV80sk-eIJ1K&typo=1
>  to unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,lrTADuMZK7-3YQwQVI98M2QtIe3X6vetMWM-r7d7aOkIyI4r9ebviUn3Zt3DP7266hKmVaHsi7YHuqRMl2Qa34whLALYOPPIkAmRLthBNJxi5A,,&typo=1

___
Please visit 
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,__bZRbafpXn77YybXrIT8vrp5HPPCi47lEsNtl-XZNPm4xWpJaPv9WPRyYhW3ZVQvnsQgeCu5aVZu0wCqwBWSSWRNUEyvXYAcg-qkT-ZxuxC4DuEJSd0BmCGog,,&typo=1
 to unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,ISqAFF76QaPqnU4mChTvAsOO3ML7KgbBDfwn3SbpXS-IEHJzUjsTCizHF7IZrVYRstLhmfu0DKXlGExNXKlgM_d16WvubXeUUOJqNO6T6Q,,&typo=1
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: A policy for removing named.conf options.

2019-06-13 Thread Lightner, Jeffrey
Systemd writes logs for things it starts to the Journal which can be viewed 
with journalctl command.

On some distros (e.g. RHEL7) it also continues to write many things to system 
logs like /var/log/messages.   Not all of what goes to the Journal is in 
/var/log/messages but all of what is in /var/log/messages goes to the Journal.


From: bind-users  On Behalf Of Leroy Tennison
Sent: Thursday, June 13, 2019 9:57 AM
To: bind-users@lists.isc.org
Subject: Re: A policy for removing named.conf options.


First of all, I appreciate the fact that you are seeking feedback before 
acting, thank you.



I agree with Warren's point about logs and, unfortunately, also with his 
analysis concerning distributions.  A couple of additional comments.



The major Linux distributions are moving to systemd (whether we like it or 
not), whatever is done has to take that into account.

The only thing you have (the most) control over is the software you produce, 
another approach would be to add a generic message facility to all your 
utilities that, for example, displays the contents of a file at startup (if it 
exists).  Daemon startup could check the configuration files and generate the 
content of the displayed file ("You're using 'blah' option which is 
depreciated, see http://...";).  This way, if an administrator uses any of your 
utilities, they see the message.  For "extra credit", add a "don't display this 
message again" option.  If an administrator manages to support your software 
without using any of your utilities then they are capable of remediating their 
own problems.

Harriscomputer

Leroy Tennison
Network Information/Cyber Security Specialist
E: le...@datavoiceint.com<mailto:le...@datavoiceint.com>

[cid:image001.png@01D521D3.3503B870]

2220 Bush Dr
McKinney, Texas
75070
www.datavoiceint.com<http://www..com>


This message has been sent on behalf of a company that is part of the Harris 
Operating Group of Constellation Software Inc. These companies are listed 
here<http://subscribe.harriscomputer.com/>.

If you prefer not to be contacted by Harris Operating Group please notify 
us<http://subscribe.harriscomputer.com/>.



This message is intended exclusively for the individual or entity to which it 
is addressed. This communication may contain information that is proprietary, 
privileged or confidential or otherwise legally exempt from disclosure. If you 
are not the named addressee, you are not authorized to read, print, retain, 
copy or disseminate this message or any part of it. If you have received this 
message in error, please notify the sender immediately by e-mail and delete all 
copies of the message.




From: bind-users 
mailto:bind-users-boun...@lists.isc.org>> on 
behalf of Ondřej Surý mailto:ond...@isc.org>>
Sent: Thursday, June 13, 2019 8:37 AM
To: Warren Kumari
Cc: bind-users@lists.isc.org<mailto:bind-users@lists.isc.org>
Subject: [EXTERNAL] Re: A policy for removing named.conf options.

Hi Warren and everybody,

first, let me thank for the fruitful discussion!

> On 13 Jun 2019, at 15:18, Warren Kumari 
> mailto:war...@kumari.net>> wrote:
>
> Many many people don't look at their logs -- could named also print
> stuff to (stdout, stderr) when starting?
>
> Note that this will require some testing -- various distributions use
> various init scripts - in many cases things printed at startup don't
> actually make it to the console, and I'm suspecting some init systems
> will barf, but...

It's undermentioned in the policy proposal, but the named-checkconf
will be loud about the deprecated options.  We can then bug distros to
integrate the named-checkconf run into the pre/postinst maintainer scripts.
(Hey myself, fix the Debian package. Ok, myself...)

> Another phased approach would be to require users to acknowledge that
> the feature is being deprecated -- initially it could warn, and then
> named could require command line flags to enable the (being)
> deprecated features, and then in the next release they would stop (e.g
> named --enable_deprecated_cleaning-interval). I think that this is way
> overkill, but just a thought.

That would take 4 full years to deprecate single option, as we need to take
people that upgrade from ESV to ESV into account, and we were aiming
at slightly "faster" approach :-).

Thanks,
--
Ondřej Surý
ond...@isc.org<mailto:ond...@isc.org>

___
Please visit 
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,yw6EFdI2bCuC2na2ur7-F1G92uow3vtsWpruIMf4wVLkS96WojpFuQ9yFBatKWXzbsJWnOpPiH9CsJum226CS7Pr4Oi5GsbAuvBcrpl8GbMNpGxrMrpl3M9XNfw,&typo=1
 to unsubscribe from thi

Re: A policy for removing named.conf options.

2019-06-13 Thread Ondřej Surý
Hey,

we’ve been discussing the “call home” feature on several occasions and usually 
something
more pressing crawls at top of the TODO list, but here’s the issue we have as a 
starter:

https://gitlab.isc.org/isc-projects/bind9/issues/421

We would be happy to collect more feedback and don’t get me started on how I 
just love
to receive patches, preferably as merge requests (ping me if you need up the 
projects limit
in our GitLab) ;).

Ondrej
--
Ondřej Surý
ond...@isc.org

> On 13 Jun 2019, at 15:55, G.W. Haywood via bind-users 
>  wrote:
> 
> Hello again,
> 
> On Thu, 13 Jun 2019, Matthijs Mekking wrote:
>> On 6/13/19 2:40 PM, G.W. Haywood via bind-users wrote:
>> > On Thu, 13 Jun 2019, Matthijs Mekking? wrote:
>> >
>> > > | managed-keys?? | 9.15/9.16 | replaced with dnssec-keys |
>> >
>> > According to my changelogs for 'named.conf I removed 'managed-keys' and
>> > 'trusted-keys' three years ago, but still use 'managed-keys-directory'.
>> ... it is likely that you are using managed trust anchors that
>> are configured with 'managed-keys' in a bind.keys file. ...
> 
> Correct.  It says in that file that I'm not expected to do anything to
> it - so I expect you'll take care of that when the time comes, yes?
> 
> To tell you about the use of configuration options, could you not set
> up an ISC zone which BIND on startup will ping with a few packets?
> You'd get a lot more (and more accurate) feedback than sending out a
> plea on a mailing list.  You could make it a compile time option, ask
> for permission at build time, etc..
> 
> -- 
> 
> 73,
> Ged.
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Leroy Tennison
First of all, I appreciate the fact that you are seeking feedback before 
acting, thank you.



I agree with Warren's point about logs and, unfortunately, also with his 
analysis concerning distributions.  A couple of additional comments.



The major Linux distributions are moving to systemd (whether we like it or 
not), whatever is done has to take that into account.

The only thing you have (the most) control over is the software you produce, 
another approach would be to add a generic message facility to all your 
utilities that, for example, displays the contents of a file at startup (if it 
exists).  Daemon startup could check the configuration files and generate the 
content of the displayed file ("You're using 'blah' option which is 
depreciated, see http://...";).  This way, if an administrator uses any of your 
utilities, they see the message.  For "extra credit", add a "don't display this 
message again" option.  If an administrator manages to support your software 
without using any of your utilities then they are capable of remediating their 
own problems.

Harriscomputer

Leroy Tennison
Network Information/Cyber Security Specialist
E: le...@datavoiceint.com


[cid:Data-Voice-International-LOGO_aa3d1c6e-5cfb-451f-ba2c-af8059e69609.PNG]


2220 Bush Dr
McKinney, Texas
75070
www.datavoiceint.com<http://www..com>


This message has been sent on behalf of a company that is part of the Harris 
Operating Group of Constellation Software Inc. These companies are listed 
here<http://subscribe.harriscomputer.com/>.

If you prefer not to be contacted by Harris Operating Group please notify 
us<http://subscribe.harriscomputer.com/>.



This message is intended exclusively for the individual or entity to which it 
is addressed. This communication may contain information that is proprietary, 
privileged or confidential or otherwise legally exempt from disclosure. If you 
are not the named addressee, you are not authorized to read, print, retain, 
copy or disseminate this message or any part of it. If you have received this 
message in error, please notify the sender immediately by e-mail and delete all 
copies of the message.






From: bind-users  on behalf of Ondřej Surý 

Sent: Thursday, June 13, 2019 8:37 AM
To: Warren Kumari
Cc: bind-users@lists.isc.org
Subject: [EXTERNAL] Re: A policy for removing named.conf options.

Hi Warren and everybody,

first, let me thank for the fruitful discussion!

> On 13 Jun 2019, at 15:18, Warren Kumari  wrote:
>
> Many many people don't look at their logs -- could named also print
> stuff to (stdout, stderr) when starting?
>
> Note that this will require some testing -- various distributions use
> various init scripts - in many cases things printed at startup don't
> actually make it to the console, and I'm suspecting some init systems
> will barf, but...

It's undermentioned in the policy proposal, but the named-checkconf
will be loud about the deprecated options.  We can then bug distros to
integrate the named-checkconf run into the pre/postinst maintainer scripts.
(Hey myself, fix the Debian package. Ok, myself...)

> Another phased approach would be to require users to acknowledge that
> the feature is being deprecated -- initially it could warn, and then
> named could require command line flags to enable the (being)
> deprecated features, and then in the next release they would stop (e.g
> named --enable_deprecated_cleaning-interval). I think that this is way
> overkill, but just a thought.

That would take 4 full years to deprecate single option, as we need to take
people that upgrade from ESV to ESV into account, and we were aiming
at slightly "faster" approach :-).

Thanks,
--
Ondřej Surý
ond...@isc.org

___
Please visit 
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,yw6EFdI2bCuC2na2ur7-F1G92uow3vtsWpruIMf4wVLkS96WojpFuQ9yFBatKWXzbsJWnOpPiH9CsJum226CS7Pr4Oi5GsbAuvBcrpl8GbMNpGxrMrpl3M9XNfw,&typo=1
 to unsubscribe from this list

bind-users mailing list
bind-users@lists.isc.org
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2flists.isc.org%2fmailman%2flistinfo%2fbind-users&c=E,1,YVga50vu8jtaQRjJyL3EYLTif7UroYK4D1uIX3KMLr4tHA0WEL7m4ytBOAe3Ry1gkCjeaIlSnMv7JrNAOoVnw5JLA1CytXg871RJx0Ey&typo=1
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread G.W. Haywood via bind-users

Hello again,

On Thu, 13 Jun 2019, Matthijs Mekking wrote:

On 6/13/19 2:40 PM, G.W. Haywood via bind-users wrote:
> On Thu, 13 Jun 2019, Matthijs Mekking? wrote:
>
> > | managed-keys?? | 9.15/9.16 | replaced with dnssec-keys |
>
> According to my changelogs for 'named.conf I removed 'managed-keys' and
> 'trusted-keys' three years ago, but still use 'managed-keys-directory'.

... it is likely that you are using managed trust anchors that
are configured with 'managed-keys' in a bind.keys file. ...


Correct.  It says in that file that I'm not expected to do anything to
it - so I expect you'll take care of that when the time comes, yes?

To tell you about the use of configuration options, could you not set
up an ISC zone which BIND on startup will ping with a few packets?
You'd get a lot more (and more accurate) feedback than sending out a
plea on a mailing list.  You could make it a compile time option, ask
for permission at build time, etc..

--

73,
Ged.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Jim Reid


> On 13 Jun 2019, at 14:18, Warren Kumari  wrote:
> 
>> A configuration option that is candidate for removal will be deprecated
>> first.  During this phase the option will still work, but we will be
>> communicating to users that the option is going to be removed soon. A
>> user that has deprecated options configured will see warnings in their
>> logs and needs to take action to get rid of those log messages.
> 
> Many many people don't look at their logs -- could named also print
> stuff to (stdout, stderr) when starting?

That probably won’t work Warren. The people that don’t/won't read their logs 
are unlikely to read named’s stdout or stderr. Assuming they knew were these 
went. Besides, those file descriptors are usually closed or get redirected to 
/dev/null whenever a daemon gets started from init or its equivalents:

% lsof -p 11450
COMMAND PID   USER   FD TYPE DEVICE SIZE/OFF  NODE NAME
...
named-9.1 11450 nobody0uVCHR   0,25  0t025 
/dev/null
named-9.1 11450 nobody1uVCHR   0,25  0t025 
/dev/null
named-9.1 11450 nobody2uVCHR   0,25  0t025 
/dev/null

How about having named-checkconf alert people to config file elements that are 
dead or about to die? This could then be documented in the README or INSTALL 
files and the ARM. I know, I know - nobody reads them either. :-(

Failing to start the name server because of a deprecated element in named.conf 
would certainly get someone's attention. Effective, but perhaps a bit extreme. 
:-)
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Ondřej Surý
Hi Warren and everybody,

first, let me thank for the fruitful discussion!

> On 13 Jun 2019, at 15:18, Warren Kumari  wrote:
> 
> Many many people don't look at their logs -- could named also print
> stuff to (stdout, stderr) when starting?
> 
> Note that this will require some testing -- various distributions use
> various init scripts - in many cases things printed at startup don't
> actually make it to the console, and I'm suspecting some init systems
> will barf, but…

It’s undermentioned in the policy proposal, but the named-checkconf
will be loud about the deprecated options.  We can then bug distros to
integrate the named-checkconf run into the pre/postinst maintainer scripts.
(Hey myself, fix the Debian package. Ok, myself…)

> Another phased approach would be to require users to acknowledge that
> the feature is being deprecated -- initially it could warn, and then
> named could require command line flags to enable the (being)
> deprecated features, and then in the next release they would stop (e.g
> named --enable_deprecated_cleaning-interval). I think that this is way
> overkill, but just a thought.

That would take 4 full years to deprecate single option, as we need to take
people that upgrade from ESV to ESV into account, and we were aiming
at slightly “faster” approach :-).

Thanks,
--
Ondřej Surý
ond...@isc.org

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread Warren Kumari
On Thu, Jun 13, 2019 at 6:46 AM Matthijs Mekking  wrote:
>
> Dear BIND 9 users,
>
> BIND 9 has a lot of configuration options.  Some have lost value over
> the years, but the policy was to keep the options to not break old
> configurations.
>
> However, we also want to clean up the code at some point.  Keeping these
> options increases the number of corner cases and makes maintenance more
> cumbersome.  It can also be confusing to new users.  We are trying to
> establish an orderly, staged process that gives existing users ample
> time to react and adapt to deprecated options.
>
> The policy below describes our proposal for the procedure for removing
> named.conf options. We would like to hear your feedback.
>
> Thanks, best regards,
>
> Matthijs
>
>
> # Policy for removing named.conf options
>
> A named.conf option will first become deprecated before it is removed
> from the code and becomes an unknown option.
>
> ## Deprecating
>
> A configuration option that is candidate for removal will be deprecated
> first.  During this phase the option will still work, but we will be
> communicating to users that the option is going to be removed soon. A
> user that has deprecated options configured will see warnings in their
> logs and needs to take action to get rid of those log messages.

Many many people don't look at their logs -- could named also print
stuff to (stdout, stderr) when starting?

Note that this will require some testing -- various distributions use
various init scripts - in many cases things printed at startup don't
actually make it to the console, and I'm suspecting some init systems
will barf, but...

Another phased approach would be to require users to acknowledge that
the feature is being deprecated -- initially it could warn, and then
named could require command line flags to enable the (being)
deprecated features, and then in the next release they would stop (e.g
named --enable_deprecated_cleaning-interval). I think that this is way
overkill, but just a thought.

W


> Configuration options that are deprecated will be identified in the
> Release Note for the release they are deprecated in.
>
> Deprecating an option can be done at any time, but preferably before the
> next ESV release.  For example, an option that that needs to be
> deprecated before the ESV 9.16 will need to flagged so in the 9.15
> development or the 9.14 stable release.
>
> ## Removing
>
> A user that has a removed option configured will be unable to start
> `named` because the configuration option is no longer known.  We plan to
> remove options first in an annual stable release, so that we will learn
> what the impact is of removing a certain option before the change hits
> the more popular ESV release.  Configuration options that are removed
> from BIND 9 will be noted in the Release Note for the first version they
> are removed from.
>
> For example, an option that has been marked as deprecated before 9.16
> could be removed in the 9.17 development release (that will become the
> stable ESV release, 9.18).
>
> If it is not removed in the stable release it should also not be removed
> in the following ESV release.  Following the example, it thus should
> also stay in 9.19/9.20.
>
> ## Removing related code
>
> The code that relates to a configuration option that is to be removed
> will in general be deleted at the same time as the configuration option
> is removed.  The BIND 9 team may decide to remove the related code at an
> earlier stage if it is considered harmful to keep. In that case the
> option will become obsolete rather than deprecated.
>
> ## Candidate options to be deprecated/removed
>
> We certainly don't want to remove any options that are still in
> widespread use. Before making the decision to go ahead with removing an
> option, we plan to post a notice on the bind-users mailing list to
> solicit feedback. Depending on the level of concern from the list, we
> may move ahead or decide to defer deprecating the option.
>
> Below is a table of candidate options we may deprecate and remove.  This
> list is by no means set in stone. Feel free to add suggestions, or add
> comments.
>
> | option | will be deprecated in | comments  |
> | -- | - | - |
> | cleaning-interval  | 9.15/9.16 | obsolete  |
> | dnssec-update-mode |   | use auto-dnssec instead   |
> | dialup |   |   |
> | managed-keys   | 9.15/9.16 | replaced with dnssec-keys |
> | trusted-keys   | 9.15/9.16 | replaced with dnssec-keys |
>
> In addition, there are already quite some options that are ancient,
> obsoleted, or never implemented before 9.15. They are listed in this issue:
>
>   https://gitlab.isc.org/isc-projects/bind9/issues/1086
>
> and may be removed in the next stable release after 9.16.
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-user

Re: A policy for removing named.conf options.

2019-06-13 Thread Matthijs Mekking
Hi,

On 6/13/19 2:40 PM, G.W. Haywood via bind-users wrote:
> Hi there,
> 
> On Thu, 13 Jun 2019, Matthijs Mekking  wrote:
> 
>> We would like to hear your feedback.
> 
> Thank you for the timely heads up.
> 
>> | managed-keys   | 9.15/9.16 | replaced with dnssec-keys |
> 
> According to my changelogs for 'named.conf I removed 'managed-keys' and
> 'trusted-keys' three years ago, but still use 'managed-keys-directory'.

First of all, it is likely that you are using managed trust anchors that
are configured with 'managed-keys' in a bind.keys file. If not, I
believe that having `managed-keys-directory` is useless.


> Will the option 'managed-keys-directory' also be deprecated?

The option `managed-keys-directory` will stay because it will serve as
the directory to store the files that track managed DNSSEC keys (i.e.,
those configured using "initial-key" keyword in the new "dnssec-keys"
statement.

Best regards,

Matthijs




signature.asc
Description: OpenPGP digital signature
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: A policy for removing named.conf options.

2019-06-13 Thread G.W. Haywood via bind-users

Hi there,

On Thu, 13 Jun 2019, Matthijs Mekking  wrote:


We would like to hear your feedback.


Thank you for the timely heads up.


| managed-keys   | 9.15/9.16 | replaced with dnssec-keys |


According to my changelogs for 'named.conf I removed 'managed-keys' and
'trusted-keys' three years ago, but still use 'managed-keys-directory'.

Will the option 'managed-keys-directory' also be deprecated?

--

73,
Ged.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: A policy for removing named.conf options.

2019-06-13 Thread Lightner, Jeffrey
I'd suggest also giving warnings for deprecated options when running 
named-checkconf (and named-checkzone if applicable).   You mention the logs but 
not the commands.

Jeffrey C. Lightner
Sr. UNIX/Linux Administrator
 
DS Services of America, Inc.
2300 Windy Ridge Pkwy
Suite 600 N
Atlanta, GA  30339-8461
 
P: 678-486-3516
C: 678-772-0018
F: 678-460-3603
E: jlight...@dsservices.com

-Original Message-
From: bind-users  On Behalf Of Matthijs 
Mekking
Sent: Thursday, June 13, 2019 6:47 AM
To: bind-users@lists.isc.org
Subject: A policy for removing named.conf options.

Dear BIND 9 users,

BIND 9 has a lot of configuration options.  Some have lost value over the 
years, but the policy was to keep the options to not break old configurations.

However, we also want to clean up the code at some point.  Keeping these 
options increases the number of corner cases and makes maintenance more 
cumbersome.  It can also be confusing to new users.  We are trying to establish 
an orderly, staged process that gives existing users ample time to react and 
adapt to deprecated options.

The policy below describes our proposal for the procedure for removing 
named.conf options. We would like to hear your feedback.

Thanks, best regards,

Matthijs


# Policy for removing named.conf options

A named.conf option will first become deprecated before it is removed from the 
code and becomes an unknown option.

## Deprecating

A configuration option that is candidate for removal will be deprecated first.  
During this phase the option will still work, but we will be communicating to 
users that the option is going to be removed soon. A user that has deprecated 
options configured will see warnings in their logs and needs to take action to 
get rid of those log messages.
Configuration options that are deprecated will be identified in the Release 
Note for the release they are deprecated in.

Deprecating an option can be done at any time, but preferably before the next 
ESV release.  For example, an option that that needs to be deprecated before 
the ESV 9.16 will need to flagged so in the 9.15 development or the 9.14 stable 
release.

## Removing

A user that has a removed option configured will be unable to start `named` 
because the configuration option is no longer known.  We plan to remove options 
first in an annual stable release, so that we will learn what the impact is of 
removing a certain option before the change hits the more popular ESV release.  
Configuration options that are removed from BIND 9 will be noted in the Release 
Note for the first version they are removed from.

For example, an option that has been marked as deprecated before 9.16 could be 
removed in the 9.17 development release (that will become the stable ESV 
release, 9.18).

If it is not removed in the stable release it should also not be removed in the 
following ESV release.  Following the example, it thus should also stay in 
9.19/9.20.

## Removing related code

The code that relates to a configuration option that is to be removed will in 
general be deleted at the same time as the configuration option is removed.  
The BIND 9 team may decide to remove the related code at an earlier stage if it 
is considered harmful to keep. In that case the option will become obsolete 
rather than deprecated.

## Candidate options to be deprecated/removed

We certainly don't want to remove any options that are still in widespread use. 
Before making the decision to go ahead with removing an option, we plan to post 
a notice on the bind-users mailing list to solicit feedback. Depending on the 
level of concern from the list, we may move ahead or decide to defer 
deprecating the option.

Below is a table of candidate options we may deprecate and remove.  This list 
is by no means set in stone. Feel free to add suggestions, or add comments.

| option | will be deprecated in | comments  |
| -- | - | - |
| cleaning-interval  | 9.15/9.16 | obsolete  |
| dnssec-update-mode |   | use auto-dnssec instead   |
| dialup |   |   |
| managed-keys   | 9.15/9.16 | replaced with dnssec-keys |
| trusted-keys   | 9.15/9.16 | replaced with dnssec-keys |

In addition, there are already quite some options that are ancient, obsoleted, 
or never implemented before 9.15. They are listed in this issue:

  https://gitlab.isc.org/isc-projects/bind9/issues/1086

and may be removed in the next stable release after 9.16.

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users