Re: Tracking down validation failures

2009-06-13 Thread Chris Thompson

On Jun 12 20009, I wrote:

[...]

The debug level 2 messages, which correspond to SERVFAILs, are all
associated with 8.84.in-addr.arpa, and it does seem that something
is wrong with the (signed) delegation of that from 84.in-addr.arpa.
I can reproduce the SERVFAIL effect on other validating nameservers.


Just to expand on that a bit: the DS record in the parent zone correctly
describes the KSK in the child zone, and the RRSIGs in 8.84.in-addr.arpa
appear to be correct ... except that they all expired over 15 months ago!

--
Chris Thompson
Email: c...@cam.ac.uk

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Tracking down validation failures

2009-06-12 Thread Chris Thompson

On Jun 11 2009, Jeremy C. Reed wrote:


On Thu, 11 Jun 2009, Chris Thompson wrote:


We have recently turned on DNSSEC validation (using dlv.isc.org) in our
main university-wide recursive nameservers, which are running BIND 9.6.1rc1.

No-one is actually complaining, but the counts I am seeing for ValFail
on the statistics channel are quite a bit higher than we were seeing
during testing, running at 0.2% - 0.4% of ValAttempt (but the counter
increases in bursts), and I would be happier knowing what they were
coming from.


Have a look at the new (experimental) query-errors category.  For example:

[...]

It is way less noisy than the dnssec logging.


This was a good suggestion - thank you. I have tried logging query-errors
at debug level 4, and some of the entries do have non-zero valfail counts.
(They don't add up to as much as the statistics-channel ValFail counter
is increasing by, though.] Here is a half-hour sample from one of the
nameservers:

12-Jun-2009 16:27:59.583 debug 4: fetch completed at resolver.c:4046
for 38.130.244.88.IN-ADDR.ARPA/PTR in 0.678061: success/not insecure
[domain:88.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]
12-Jun-2009 16:35:00.415 debug 4: fetch completed at resolver.c:4046
for 102.136.103.91.IN-ADDR.ARPA/PTR in 1.045085: success/not insecure
[domain:91.in-addr.arpa,referral:0,restart:1,qrysent:3,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:2]
12-Jun-2009 16:36:31.380 debug 2: fetch completed at resolver.c:2891
for 130.40.8.84.in-addr.arpa/PTR in 3.500594: failure/no valid DS
[domain:40.8.84.in-addr.arpa,referral:1,restart:2,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:2]
12-Jun-2009 16:36:38.606 debug 2: fetch completed at resolver.c:2891
for 130.40.8.84.in-addr.arpa/PTR in 3.689695: failure/no valid ds
[domain:40.8.84.in-addr.arpa,referral:0,restart:2,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:2]
12-Jun-2009 16:36:58.459 debug 4: fetch completed at resolver.c:4046
for 55.106.0.89.IN-ADDR.ARPA/PTR in 0.642334: success/not insecure
[domain:89.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]
12-Jun-2009 16:41:53.588 debug 2: fetch completed at resolver.c:2891
for 130.40.8.84.in-addr.arpa/PTR in 4.228979: failure/no valid DS
[domain:40.8.84.in-addr.arpa,referral:0,restart:2,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:2]
12-Jun-2009 16:43:34.731 debug 4: fetch completed at resolver.c:4046
for 172.164.22.213.IN-ADDR.ARPA/PTR in 0.489031: success/not insecure
[domain:213.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]
12-Jun-2009 16:43:55.521 debug 2: fetch completed at resolver.c:2891
for 40.8.84.in-addr.arpa/DS in 3.186479: failure/no valid RRSIG
[domain:8.84.in-addr.arpa,referral:1,restart:2,qrysent:4,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]
12-Jun-2009 16:47:36.840 debug 4: fetch completed at resolver.c:4046
for 157.14.110.87.IN-ADDR.ARPA/PTR in 0.551489: success/not insecure
[domain:87.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]
12-Jun-2009 16:47:59.038 debug 2: fetch completed at resolver.c:2891
for 40.8.84.in-addr.arpa/DS in 1.243316: failure/no valid RRSIG
[domain:8.84.in-addr.arpa,referral:1,restart:2,qrysent:4,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]
12-Jun-2009 16:48:08.100 debug 4: fetch completed at resolver.c:4046
for 126.85.252.77.IN-ADDR.ARPA/PTR in 0.635810: success/not insecure
[domain:77.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]
12-Jun-2009 16:53:01.580 debug 2: fetch completed at resolver.c:2891
for 52.7.8.84.in-addr.arpa/PTR in 10.775506: failure/no valid DS
[domain:8.84.in-addr.arpa,referral:0,restart:2,qrysent:4,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]
12-Jun-2009 16:53:19.150 debug 2: fetch completed at resolver.c:2891
for 52.7.8.84.in-addr.arpa/PTR in 12.530152: failure/no valid DS
[domain:8.84.in-addr.arpa,referral:0,restart:2,qrysent:4,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]
12-Jun-2009 16:53:35.240 debug 2: fetch completed at resolver.c:2891
for 52.7.8.84.in-addr.arpa/PTR in 11.088051: failure/no valid DS
[domain:8.84.in-addr.arpa,referral:0,restart:2,qrysent:4,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]
12-Jun-2009 16:53:51.844 debug 4: fetch completed at resolver.c:4046
for 134.240.154.88.IN-ADDR.ARPA/PTR in 0.643090: success/not insecure
[domain:88.in-addr.arpa,referral:0,restart:1,qrysent:2,timeout:0,
lame:0,neterr:0,badresp:0,adberr:0,findfail:0,valfail:1]

The debug level 2 messages, which correspond to SERVFAILs, are all
associated with 8.84.in-addr.arpa, and it does seem 

Re: Tracking down validation failures

2009-06-12 Thread JINMEI Tatuya / 神明達哉
At 12 Jun 2009 17:50:39 +0100,
Chris Thompson c...@cam.ac.uk wrote:

 (They don't add up to as much as the statistics-channel ValFail counter
 is increasing by, though.]

It's not surprising: if validation attempt succeeds with one
authoritative server after some validation failures with other
authoritative servers, you won't see the intermediate error in
query-error log messages.  But these failures are still counted in
ValFail.

---
JINMEI, Tatuya
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Tracking down validation failures

2009-06-11 Thread Jeremy C. Reed
On Thu, 11 Jun 2009, Chris Thompson wrote:

 We have recently turned on DNSSEC validation (using dlv.isc.org) in our
 main university-wide recursive nameservers, which are running BIND 9.6.1rc1.
 
 No-one is actually complaining, but the counts I am seeing for ValFail
 on the statistics channel are quite a bit higher than we were seeing
 during testing, running at 0.2% - 0.4% of ValAttempt (but the counter
 increases in bursts), and I would be happier knowing what they were
 coming from.

Have a look at the new (experimental) query-errors category.  For example:

11-Jun-2009 12:59:43.332 query-errors: debug 1: client 127.0.0.1#59980: 
query failed (SERVFAIL) for advocaat.pro/IN/SOA at query.c:4626

11-Jun-2009 12:59:43.332 query-errors: debug 2: fetch completed at 
resolver.c:2995 for advocaat.pro/SOA in 0.422699: failure/insecurity proof 
failed [domain:pro,referral:1,restart:2,qrysent:4,timeout:0,lame:0,
neterr:0,badresp:0,adberr:0,findfail:0,valfail:4]

It is way less noisy than the dnssec logging.

Also you should see some of the logging by default in the lame-servers 
category (at level info) such as:

Jun 11 12:59:43 tx named[1490]: error (insecurity proof failed) resolving 
'advocaat.pro/SOA/IN': 192.149.63.10#53
Jun 11 12:59:43 tx named[1490]: error (insecurity proof failed) resolving 
'advocaat.pro/SOA/IN': 192.149.62.10#53
Jun 11 12:59:43 tx named[1490]: error (insecurity proof failed) resolving 
'advocaat.pro/SOA/IN': 192.149.64.10#53
Jun 11 12:59:43 tx named[1490]: error (insecurity proof failed) resolving 
'advocaat.pro/SOA/IN': 192.149.66.10#53

(see valfail count above is 4)
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Tracking down validation failures

2009-06-11 Thread Mark Andrews

In message prayer.1.3.1.0906111834360.6...@hermes-2.csi.cam.ac.uk, Chris Thom
pson writes:
 We have recently turned on DNSSEC validation (using dlv.isc.org) in our
 main university-wide recursive nameservers, which are running BIND 9.6.1rc1.
 
 No-one is actually complaining, but the counts I am seeing for ValFail
 on the statistics channel are quite a bit higher than we were seeing
 during testing, running at 0.2% - 0.4% of ValAttempt (but the counter
 increases in bursts), and I would be happier knowing what they were
 coming from.
 
 The advice usually given is to log category dnssec at debug level 3,
 but this produces far too much data. Reducing it debug level 2, on the
 other hand, gives almost nothing. I do see a trickle of info-level
 messages:
 
 11-Jun-2009 18:12:32.375 info:   validating @15abde10:
  17.62.212.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:12:32.376 info:   validating @15abde10:
  17.62.212.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:12:42.258 info:   validating @f3e9cb8:
  99.188.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:12:42.259 info:   validating @f3e9cb8:
  99.188.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:15:08.235 info:   validating @15bed590:
  97.102.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:15:08.236 info:   validating @15bed590:
  97.102.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:15:08.592 info:   validating @15bed590:
  97.102.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:15:08.593 info:   validating @15bed590:
  97.102.91.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:19:32.048 info:   validating @8af4a40:
  99.96.79.IN-ADDR.ARPA NSEC: no valid signature found
 11-Jun-2009 18:19:32.049 info:   validating @8af4a40:
  99.96.79.IN-ADDR.ARPA NSEC: no valid signature found
 
 but it's not even obvious what the original query was in these cases.
 (If I could find that out I could try the same query on a quieter
 nameserver with more logging turned on.) There are no messages 
 generated at this level when I force a validation failure to occur 
 (dig soa advocaat.pro remains my favourite).
 
 Any suggestions?
 
 -- 
 Chris Thompson
 Email: c...@cam.ac.uk
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

Do you have RIPE's trusted-keys configured into named.conf and are
they up to date? 

http://www.ripe.net/projects/disi/keys/
https://www.ripe.net/projects/disi/keys/ripe-ncc-dnssec-keys-new.txt

Note named won't go to dlv if the answer is within a island of security
identified by a trusted-key in named.conf.

The data currently being returned looks good to me.

This is a referral to a insecure zone.

17.62.212.IN-ADDR.ARPA. 172800  IN  NS  ans2.cw.net.
17.62.212.IN-ADDR.ARPA. 172800  IN  NS  ans1.cw.net.
17.62.212.IN-ADDR.ARPA. 7200IN  NSEC170.62.212.in-addr.arpa. NS 
RRSIG NSEC
17.62.212.IN-ADDR.ARPA. 7200IN  RRSIG   NSEC 5 5 7200 20090711232326 
20090611232326 34470 212.in-addr.arpa. 
pY89tH87GQjFm4YRAHCx8wY0R14fjN0Qb+wwGCDbJjAC1zezYUT+ltZN 
J/5akqXTY7vQ/h7u/t8gz7qf1Q1mSE0xngF/3amoZaNHpPNT9BGOeF89 
kC4ucFI2e/MnU9lvmEJHVT5Ma0eJ4LRgFlGaeUmSMaPjRBxpOJpNGP/x 
O/jxf84LTsANHVBew8a7BI9tmg0ozppN
;; Received 338 bytes from 2001:660:3006:1::1:1#53(NS3.NIC.FR) in 548 ms

% date -u +%Y%m%d%H%M%S
20090612011526
% 

Validation interval ok.  20090711232326  20090612011526  20090611232326
No DS in list of types that exist at 17.62.212.IN-ADDR.ARPA.
Signed with key 34470.

;  DiG 9.3.6-P1  +dnssec +multi dnskey 212.IN-ADDR.ARPA
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 4082
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;212.IN-ADDR.ARPA.  IN DNSKEY

;; ANSWER SECTION:
212.IN-ADDR.ARPA.   2663 IN DNSKEY 256 3 5 (
AwEAAbW5cAVaimsuasYP4uwC/Id+/MJce+q+9FwBz4iO
bkPa5YNFz7qeV+y8BjKI/7nQ/4fh/Xd7tp+5eYT47GEx
ALl4GBGKoW22k/IpD1nqNuGs4BYvuG/kTfhtTEWyfMbB
20M17W0vPbHmhLDbdGO0qg1HPQZ0gXYFCofu9OX86OGL
V+YFEJ+NeWiNHg91xq1svv0sehJp7w==
) ; key id = 34470
212.IN-ADDR.ARPA.   2663 IN DNSKEY 256 3 5 (
AwEAAd2guc91r8v8RRtTcKLIGWPbLNi9HuAmcxNwW+7N
4KCPxci7GPqgqD/m88qbBDYdm1XMLHSV+lZ+DbifbFpw
cIu1+vt4dEGB7O9bCuZwQG89HN7IpTRhZQXH3P8O5eCt
7UJEOm4BWfRD4DKYyuOHGpdWTqyzY0TKGWECXW00X1rQ
t4MZmBl8Z4r8kLN+X4jWXoQzpygfXw==
) ; key id = 12075
212.IN-ADDR.ARPA.   2663 IN DNSKEY 257 3 5 (