[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-07 Thread LaMont Jones
And after more investigation, I can see that what I really need is a
failing system where I can poke at it to understand what is going on --
the whole all-TLDs-are-signed-and-that's-why doesn't seem to pan out as
I tried to reproduce the issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-06 Thread LaMont Jones
When the config has "dnssec-validation auto;", BIND attempts to validate
all answers, and stops checking once it gets to a DNS zone that has no
signatures.  Categorically, all TLDs have signatures, so the lack of a
signature on the .maas DNS zone is fatal to the DNSSEC validation.

If the domain in question were "maas.example.com", then the validation would 
proceed as follows (while being a bit handwavy about the specifics of requests, 
I admit):
1) verify the .com signature
2) verify the .example.com signature (if any, otherwise declare success: done 
validation)
3) verify the .maas.example.com signature (if any, otherwise declare success: 
done validation)
4) verify the signature for machine.maas.example.com (if any, otherwise declare 
success: done validation)

BIND doesn't care if you're a primary or a secondary or caching - it's 
validating the RRset, not the server.
I am not aware of any distinction in BIND wrt "not an official TLD" -- Note 
also that if you wanted to set that, you would have to set it as an enterprise 
wide configuration option on every resolver, which does not scale.

As far as saner default MAAS domain names, that warrants more discussion.  A 
non-exhaustive list:
1) default to a subdomain of the the FQDN of the region, minus the first lable. 
 (mymaashost.example.com becomes maas.example.com)  Pro: The admin is very 
likely the admin of example.com.  Con: the second time you do this, you have 
duplicate domains, and if they ever need to talk to each other, there is a 
rename...
2) default to the FQDN of the region (mymaashost.example.com becomes the 
default domain name) Pro: we have good confidence that we OWN this point in the 
DNS tree, and its descendants. Con: upstream quite possibly controls our 
address set, and delegation at this point means that we become authoritative 
for the addresses, while upstream needs them for glue.  Changing the 
upstream-facing IP of the server becomes a more difficult process
3) default to maas.FQDN of the region (mymaashost.example.com becomes 
maas.mymaashost.example.com) Pro: we definitely control everything from that 
down.  Cons: likely redundant.

Whatever the domain is, we should (at least in the docs) be telling the
admin what to add to the parent DNS zone to properly delegate (and maybe
even have secondaries..) the DNS for the MAAS region.  At what point
DNSSEC signatures stop is left as a discussion for upstream DNS.  MAAS
generating signatures is the subject of
https://bugs.launchpad.net/maas/+bug/1620662

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-06 Thread Christian Reis
I'm curious whether this affects *.maas, when in fact the MAAS server
itself is primary for that domain. In other words, the request should
not ever hit the forwarder, should it?

Or does BIND do a root check anyway to ensure that we are indeed allowed
to be primary for that TLD?

If we are, is there a way to say "this is not an official TLD" that
wouldn't trigger the problem?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-05 Thread LaMont Jones
Having said that, if MAAS is going to continue to defualt to, and
RECOMMMEND that users use, a TLD of "maas", then MAAS should default
it's setting to "dnssec no" in the case where the default domain is
still named "maas" -- Open to discussion is whether this should be thru
chaning the global setting, or overridden at named.conf generation time.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-05 Thread LaMont Jones
The current state of the DNS is that the root zone is signed, and
EVERYTHING delegated from it is signed by the root zone.  Once you get
below that, the lack of signatures on a zone is left as an exercise for
the admins of that zone.  (example.com can be delegated from the
[signed] COM zone without being signed, and that's all good and fine and
DNSSEC=auto handles that just fine.)

What doesn't work is when the admin chooses to use an undelegated top-
level domain (TLD), which won't be signed by the root key, and therefore
fails DNSSEC validation.

Especially given the recent changes in what constitutes a valid TLD, the
admin choosing to use a TLD oftheir own choosing is hoping from their
hearts that there will never be sufficient demand for that TLD to cause
it to be creeated and subdomains sold therein by various registries.
Because when that happens, and their users want to access things in that
newly-created TLD, then they will get to go and change all of their
domain names to avoid that.

Properly delegating children (whether that is published publicly or not)
from domain names that are actually under the control of the admin is
the only sane way of doing this.

** Changed in: bind9 (Ubuntu)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-05 Thread Christian Reis
(In other words, MAAS should do something like the described in
https://docs.menandmice.com/display/MM/How+to+test+DNSSEC+validation
when the forwarder is configured, and tweak the setting automatically
with a warning).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-05 Thread Andreas Hasenack
@Lamont, I have had to disable this option when the upstream is a
canonical.com dns. Something we can do there perhaps?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-09-05 Thread Christian Reis
This continues to cause us pain, though; I just spent an hour looking
through a DNS issue to remember that this was the root cause. We should
either change the default or make it so we can detect when the forwarder
won't handle DNSSEC and correctly disable it -- a failure in the field
due to this is unacceptable.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-05-23 Thread Mike Pontillo
+1 to the above comments; I tend to think this is a "Won't Fix" in the
bind9 package. I would stop short of making it "Opinion", because it
does not appear to be open for discussion.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-05-23 Thread Andres Rodriguez
I tend to agree with LaMont here...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2016-05-20 Thread LaMont Jones
It is defaulted to "auto" because more and more of the internet _IS_
enabling DNSSEC: all delegations from the root are signed, and most
registries will take care of getting the DS RRsets into the parent zone.

The only way to actually fix some of the DNS cache poisoning attacks is
to enable DNSSEC.  That the upstream forwarder doesn't support dnssec is
a configuration bug in the upstream forwarder.  I'm disinclined to make
the default be less secure, in order to "support" broken upstream
forwarders.  But I'll stop short of marking it Won't Fix, at least for
now.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2015-10-08 Thread Robie Basak
** Changed in: bind9 (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2015-10-08 Thread Robie Basak
** Changed in: bind9 (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2015-10-07 Thread Mike Pontillo
Yes, that seems to be the argument. I would like to understand why it
seems to be that many environments are set up with a forwarder that does
not support DNSSEC. (is this by choice? is it a particular vendor, or
old DNS server which does not forward the queries properly?
misconfigured firewall rules?)

There are three possible values for the BIND dnssec-validation option:
'yes', 'no', and 'auto'.

By saying "enabled with automatic keys", we just mean the default value
of "dnssec-validation auto;" in the BIND configuration file.

See also: http://users.isc.org/~jreed/dnssec-guide/dnssec-guide.html
#dnssec-validation-explained

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1500683] Re: By default DNSSEC is enabled with automatic keys

2015-10-07 Thread Mike Pontillo
Yes, that seems to be the argument. I would like to understand why it
seems to be that many environments are set up with a forwarder that does
not support DNSSEC. (is this by choice? is it a particular vendor, or
old DNS server which does not forward the queries properly?
misconfigured firewall rules?)

There are three possible values for the BIND dnssec-validation option:
'yes', 'no', and 'auto'.

By saying "enabled with automatic keys", we just mean the default value
of "dnssec-validation auto;" in the BIND configuration file.

See also: http://users.isc.org/~jreed/dnssec-guide/dnssec-guide.html
#dnssec-validation-explained

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500683

Title:
  By default DNSSEC is enabled with automatic keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1500683/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs