Re: Making unbound-anchor very verbose

2015-09-22 Thread Edward Lewis via Unbound-users
Thanks.  That has kicked me off in some direction.

On 9/21/15, 11:02, "Unbound-users on behalf of unbound-users@unbound.net"

wrote:

>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA256
>
>Hi Ed,
>
>It does not say a lot because all it does is do an UDP query, see that
>it works, and exit.  If you add, say, -F (force TLS update), then
>it'll print out a lot of info (with -).  Like, https headers, ssl
>certificates, xml contents ...
>
>Best regards, Wouter
>
>On 14/09/15 18:56, Edward Lewis via Unbound-users wrote:
>> D'oh - smallapp/...
>> 
>> On 9/14/15, 12:04, "Edward Lewis"  wrote:
>> 
>>> I'd like to have unbound-anchor be (able to be) much more
>>> verbose.
>>> 
>>> $ unbound-anchor -a testroot.key $ unbound-anchor -a testroot.key
>>> -v testroot.key has content success: the anchor is ok $
>>> unbound-anchor -a testroot.key -v testroot.key has content
>>> success: the anchor is ok $ unbound-anchor -a testroot.key -v -v
>>> -v -v testroot.key has content success: the anchor is ok
>>> 
>>> I.e., the latter two ought to "show the work done."  I'm more
>>> interested in the process than obtaining the result (so long as
>>> the result is as expected).
>>> 
>>> 
>>> I'm not too familiar with unbound distributions.  Where (in what
>>> files) can I add print/echo statements to do this?  (I don't have
>>> specific statements to add, I need to prototype it.)  I just
>>> don't read script well enough I guess. ;)
>
>-BEGIN PGP SIGNATURE-
>Version: GnuPG v2
>
>iQIcBAEBCAAGBQJWABwHAAoJEJ9vHC1+BF+Neb8P/jSBaxli4sPh8Ip2amMPo+7I
>fT4FLX17Rgld6kbgG0KPKSpFI2vCCO+n/L98naqKSKwSZdDEyKDDQ80C2ARxLfuB
>v1oFQRtDY4+FHpmIyhzbAVMz1Q0Ghs7VQvcpAJbTv5s0L+Gj6ZwoG8TmNb8rdG1A
>GAoS2BZBC/Gb0WRsR5e9ZlkjV8i5jGDEFYybiNvGnrsc4HKZjPXOO7/EJlEGNjtX
>EhYTrCm2XrvNIQx9Gm4b2OyGbUmsM6RsJZc6IDLyKFrHnC2Uo1VOulx2bLj1ekHl
>g5ZifUimdluPJ5zeItSGpPtAxGFunA+N2l2D1ydph3S4Ov5o1yneWf4pbA9OSwJo
>/gRChnRLzNFFEVu3CDJLlOQjHLo48Hxj5K87kuJmK301bVuhhnPzKHXu+O2qlSX9
>IyQPzMatG+XgM+hPg4N2OEJegoq6cCLANV4y9klvQ6tIGGl29185ZPI4Nz4h2FCB
>+fWSz8/rEbpmAnbetg5Vl2hR5gJD8+Dbh29HAGZEw2YSbNAY0nXr6A7bXDmL1oRc
>2Na4kp0VhsPK2ErK+gXCbL1hyYYaRQIJmVaw0+9y8CA6wGw5Lgfz6CbYGaV/HA6s
>ihiWSVH0751WUNWl+2BrBR1xzK5sS1kduDirPdFBz5iSRmy1eMpWONqQ6G70TmDh
>eAwS32SX1p/Gn/l0jY+K
>=Sd/Z
>-END PGP SIGNATURE-


smime.p7s
Description: S/MIME cryptographic signature


Re: inconsistent forward-zone behavior between config files, unbound-control

2015-09-22 Thread Robert Edmonds via Unbound-users
A. Schulze via Unbound-users wrote:
> Am 22.09.2015 um 19:02 schrieb Mike Brown via Unbound-users:
> >* by default, queries go to my ISP's resolvers (Comcast: 75.75.75.75 &
> >75.75.76.76)
> why would you do that?

Comcast's 75.75.75.75 and 75.75.76.76 nameservers are anycasted.
75.75.75.75 in particular should (probably) be routed to a nearby
Comcast data center.

For instance, on my home Comcast connection, 75.75.75.75, F-Root, and
L-Root all have anycast instances located in a local Comcast facility,
so the RTT to these three servers are identical (~10 ms) for me.

Comcast's servers perform DNSSEC validation and it should in theory be
possible to have a validating DNS server like Unbound forward to those
servers and re-validate the answers, so for a lightly loaded server it
may actually result in *better* performance (latency wise) to forward to
the nearby Comcast cache rather than directly contacting authoritative
nameservers that may be much farther than ~10 ms away.

> Also I'm not aware any unbound configuration is modified in any way by a DHCP 
> client.
> I use to ignore any resolver announced by a DHCP server:

The stock upstream Unbound distribution does not have any DHCP client
integration, true.  However, some OSes (e.g. Debian) have optional
resolvconf integration, which can be used to automatically configure
nameservers learned via DHCP as forwarders for Unbound.  Other OSes may
have similar functionality.  This only works well if those nameservers
perform DNSSEC validation, however.

-- 
Robert Edmonds
edmo...@debian.org


Re: inconsistent forward-zone behavior between config files, unbound-control

2015-09-22 Thread A. Schulze via Unbound-users



Am 22.09.2015 um 19:02 schrieb Mike Brown via Unbound-users:

* by default, queries go to my ISP's resolvers (Comcast: 75.75.75.75 &
75.75.76.76)

why would you do that?

I expect Comcast not to block other DNS queries? Assuming that I would suggest
to run unbound simply in default configuration -> resolving direct via root 
nameservers.
No default forwarding -> no need to configure exceptions for DNSBL zones.

Also I'm not aware any unbound configuration is modified in any way by a DHCP 
client.
I use to ignore any resolver announced by a DHCP server:

$ stat --printf "%a\n" /etc/dhcp/dhclient-enter-hooks.d/do_not_touch_resolv_conf
755

$ cat /etc/dhcp/dhclient-enter-hooks.d/do_not_touch_resolv_conf
#!/bin/sh
make_resolv_conf() {
 logger -p daemon.info -t /etc/dhcp/dhclient-enter-hooks.d/do_not_touch_resolv_conf 
"ignore DHCP suggestion 'nameserver $new_domain_name_servers'"
 :
}


inconsistent forward-zone behavior between config files, unbound-control

2015-09-22 Thread Mike Brown via Unbound-users
It is quite possible I am just clueless and doing things all wrong, so please 
forgive me if this is a waste of your time. I've Googled and experimented for 
hours, and am no closer to understanding what's going wrong here.

I'm just trying to get Unbound configured on FreeBSD 10.2-STABLE such that:

* the DHCP-assigned nameserver (10.0.1.1, my router) is ignored, even after 
lease renewals

* by default, queries go to my ISP's resolvers (Comcast: 75.75.75.75 & 
75.75.76.76)

* DNSBL zone queries bypass the ISP's resolvers - e.g., *.multi.uribl.com 
needs to be resolved starting from the root servers, such that a TXT lookup of 
test.uribl.com.multi.uribl.com will return the descriptive text "permanent 
testpoint" rather than "127.0.0.1 -> Query Refused. See 
http://uribl.com/refused.shtml for more information [Your DNS IP: 76.x.x.x]"

At the bottom of this post you can see my config files.

The reason I'm bypassing the DHCP-assigned nameserver is because I only get 
SERVFAIL for any lookup with it, even though it just forwards to my ISP. It's 
a current-model Apple AirPort Time Capsule, so you'd think it would be 
DNSSEC-friendly, but I guess not, and of course there's no advanced settings 
available in the AirPort Utility.

The main thing I'm trying to diagnose at this point is not the DHCP stuff, 
rather just the DNSBL forwards.

When using my config files, lookups for most domains work, but the DNSBL test
only ever gives me SERVFAIL.

tcpdump is not very helpful; nothing is going out over the wire for those 
lookups, even on first try:

17:06:36.553477 IP (tos 0x0, ttl 64, id 46664, offset 0, flags [none], proto 
UDP (17), length 76, bad cksum 0 (->c656)!)
127.0.0.1.52659 > 127.0.0.1.53: [bad udp cksum 0xfe4b -> 0xede4!] 60714+ 
TXT? test.uribl.com.multi.uribl.com. (48)
17:06:36.561421 IP (tos 0x0, ttl 64, id 46675, offset 0, flags [none], proto 
UDP (17), length 76, bad cksum 0 (->c64b)!)
127.0.0.1.53 > 127.0.0.1.52659: [bad udp cksum 0xfe4b -> 0x6d62!] 60714 
ServFail q: TXT? test.uribl.com.multi.uribl.com. 0/0/0 (48)

And here's the unbound -ddvvv output: http://pastebin.com/raw.php?i=dcRP67yZ
It includes the startup messages and the messages resulting from these 4 
commands (and I realize I may be a bit paranoid with the flushes):

# unbound-control -c /var/unbound/unbound.conf list_forwards
. IN forward 75.75.75.75 75.75.76.76
multi.uribl.com. IN forward multi.uribl.com.
# unbound-control -c /var/unbound/unbound.conf flush_zone multi.uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# unbound-control -c /var/unbound/unbound.conf flush_zone uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# host -tTXT test.uribl.com.multi.uribl.com
Host test.uribl.com.multi.uribl.com not found: 2(SERVFAIL)


OK, bear with me here. If I remove the "." forward at this point, I still get 
SERVFAIL:

 # unbound-control -c /var/unbound/unbound.conf forward_remove .
ok
# unbound-control -c /var/unbound/unbound.conf list_forwards
multi.uribl.com. IN forward multi.uribl.com.
# unbound-control -c /var/unbound/unbound.conf flush_zone multi.uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# unbound-control -c /var/unbound/unbound.conf flush_zone uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# host -tTXT test.uribl.com.multi.uribl.com
Host test.uribl.com.multi.uribl.com not found: 2(SERVFAIL)


...And everything works fine if I remove both forwards:

# unbound-control -c /var/unbound/unbound.conf forward_remove .
ok
# unbound-control -c /var/unbound/unbound.conf forward_remove multi.uribl.com
ok
# unbound-control -c /var/unbound/unbound.conf flush_zone multi.uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# unbound-control -c /var/unbound/unbound.conf flush_zone uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# host -tTXT test.uribl.com.multi.uribl.com
test.uribl.com.multi.uribl.com descriptive text "permanent testpoint"


Now here's the really weird part: I can add the forwards back in with 
unbound-control, and the behavior is different. Now the DNSBL forward is still 
not working, but instead of SERVFAIL, it is going through the default forward!

# unbound-control -c /var/unbound/unbound.conf forward_add . 75.75.75.75 
75.75.76.76
ok
# unbound-control -c /var/unbound/unbound.conf forward_add multi.uribl.com 
multi.uribl.com
ok
# unbound-control -c /var/unbound/unbound.conf list_forwards
. IN forward 75.75.76.76 75.75.75.75
multi.uribl.com. IN forward multi.uribl.com.
# unbound-control -c /var/unbound/unbound.conf flush_zone uribl.com
ok removed 11 rrsets, 4 messages and 0 key entries
# unbound-control -c /var/unbound/unbound.conf flush_zone multi.uribl.com
ok removed 0 rrsets, 0 messages and 0 key entries
# host -tTXT test.uribl.com.multi.uribl.com
test.uribl.com.multi.uribl.com descriptive text "127.0.0.1 -> Query Refused. 
See http://uribl.com/refused.shtml for more information [Your DNS IP: 
76.96.107.199]"

(I do note one small difference: the 

Re: rfc6761 compliance

2015-09-22 Thread Paul Wouters via Unbound-users

On Tue, 22 Sep 2015, Robert Edmonds via Unbound-users wrote:


W.C.A. Wijngaards via Unbound-users wrote:

It is not a particularly heavy root server load to mitigate, less code
is better and easier, the unblock-lan-zones statement is a frequently
asked question from our users.  That said, we could add new code for
this (and .onion?).



Here are the caching DNS considerations for the zones that Unbound
currently doesn't handle:

[ "test." ]
[ "invalid." ]
[ "onion." ]


While I don't see much harm in test and valid, there is a stronger case
for onion not to leak out. I hope upstream will block it per default.
If not, I might add a conf file to do so in the default unbound
configuration for Fedora.

Paul


Re: rfc6761 compliance

2015-09-22 Thread Robert Edmonds via Unbound-users
W.C.A. Wijngaards via Unbound-users wrote:
> It is not a particularly heavy root server load to mitigate, less code
> is better and easier, the unblock-lan-zones statement is a frequently
> asked question from our users.  That said, we could add new code for
> this (and .onion?).

Hi, Wouter:

I would guess that the .test and .invalid zones are much less used in
private networks than the .in-addr.arpa ones, so much less likely to be
a FAQ.  And most of the code to setup default empty zones has been
written already.

Here are the caching DNS considerations for the zones that Unbound
currently doesn't handle:

[ "test." ]
   Caching DNS servers SHOULD recognize test names as special and
   SHOULD NOT, by default, attempt to look up NS records for them,
   or otherwise query authoritative DNS servers in an attempt to
   resolve test names.  Instead, caching DNS servers SHOULD, by
   default, generate immediate negative responses for all such
   queries.  This is to avoid unnecessary load on the root name
   servers and other name servers.  Caching DNS servers SHOULD offer
   a configuration option (disabled by default) to enable upstream
   resolving of test names, for use in networks where test names are
   known to be handled by an authoritative DNS server in said
   private network.

[ "invalid." ]
   Caching DNS servers SHOULD recognize "invalid" names as special
   and SHOULD NOT attempt to look up NS records for them, or
   otherwise query authoritative DNS servers in an attempt to
   resolve "invalid" names.  Instead, caching DNS servers SHOULD
   generate immediate NXDOMAIN responses for all such queries.  This
   is to avoid unnecessary load on the root name servers and other
   name servers.

[ "onion." ]
   Caching DNS Servers: Caching servers, where not explicitly
   adapted to interoperate with Tor, SHOULD NOT attempt to look up
   records for .onion names.  They MUST generate NXDOMAIN for all
   such queries.

I notice the .onion Special-Use registration has a MUST while the other
two only have SHOULDs.

Probably there will be a few more additions to the Special-Use Domain
Names registry, and even if they only generate a trivial amount of root
server load now, that means it's easy to prevent them from becoming a
problem later :-)

-- 
Robert Edmonds
edmo...@debian.org


Re: unbound-control flush_zone behaviour w.r.t the DS record

2015-09-22 Thread Paul Wouters via Unbound-users

On Tue, 22 Sep 2015, W.C.A. Wijngaards via Unbound-users wrote:


Today I ran into an unexpected flush issue. A domain with DS record
no longer signed its zone and became BOGUS. Once the registrar
removed the DS record, I ran an unbound-control flush_zone on the
zone, but I still received a SERVFAIL. Turns out the DS record of a
domain is not flushed because it does not live in the child zone
but in the parent zone.

I suggest to change the behaviour of unbound to also flush DS
records of a zone in its parent with the flush_zone command.


The flush_zone command flushes the DS record too.  This works for me
(eg. lookup a domain, dig DS record, flush it, dig DS record - fresh
TTL).  But I understand the domain you had did not become non-bogus
after the flush?  Was something else not flushed that should be?


I'm not sure. It did not become non-bogus for sure. I didn't drop the
cache and the domain is fixed now. So you'll have to create a test
case I guess? :)

Paul


Re: unbound.conf(5) access-control suggestions

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Patrik,

On 05/08/15 20:14, Patrik Lundin via Unbound-users wrote:
> Hello,
> 
> Following the recent man page modifications I was reminded of
> another part of the manual that I am curios if it could be modifed
> a bit. This is the part about the access-control statement. I have
> two suggestions:
> 
> #1. Mention how the rules are evaluated. Is it first match wins,
> last match wins, or most specific match wins? This is important
> when configuring overlapping rules (because only a specific subset
> should have allow_snoop for example). My testing points towards
> the most-specific-match option.

Yes. Documented that.

> 
> #2. Mention what the behaviour is for clients that do not match a 
> configured ACL. While it is stated that the unconfigured default
> is "allow localhost and refuse the rest", it is not explicitly
> stated what happens to unmatched clients when once an ACL is
> configured.

The "deny" action is taken if there are no rules.  Documented that.

Best regards, Wouter


-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=KHiu
-END PGP SIGNATURE-


Re: Minor error in unbound.conf.5.in

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Ross,

On 01/09/15 06:29, Ross L Richardson via Unbound-users wrote:
> Word repetition error: If the the minimum kicks in should be If the
> minimum kicks in

Thank you. Fixed.

Best regards, Wouter
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJWAVDoAAoJEJ9vHC1+BF+Nd2YQAKKUQIY44uOYPsIqUoGnUNFj
uzrtoW8NIwNAThoqs85JRTkQwsOtphCOraCcvR6g3MrYy6Zm2moFQFRwrm5xeDTp
J0FVU8JgHiNJTxD2ucizeJERzO5x2dBkv75JzxrTtgK7NaVaQkZZXpWCkFUzruDi
scpYmwcDHw8/7wmNMtXVdAf621ONot23rsZa35G/VxTJXnje4mn4uvcJfOloGHkT
BC0s1QfBCmtlZuzjFHpVLoDweskgLbHbpjdYOR5OrYkqcUSNwuG35cAEjLqZULHS
Sdr1TOwcpVrNAdPm1XiwuLaJcJH/WvBduMiM1ZgTCc5hjuhGG9w01NVOI1I/EJUM
ERZxH37JAEUqRu8EbSp1tau3frg1gRuuE0qT3ngryHr/uitBsF0+dh8Yc0clTMHd
AIMn7MlSYiPce/SqhkIckAq/18gCkCRSpFYY8n4SUQ/Sp9P/3qTBsLtkeNsAeKHc
KALQdpI78OI2DcvJ1r/QnkyXLiRT26+vtPgv2PsCFVOYe10sfUgymltA7RWWm9ku
KcHAbCU8Zoy9jZQ4mBs0+jRyzY5gpDr51Cs1B2eyNjEKLZ24FKdB1JV7b5YSZ25V
3upnswfKlnWtFmPwgWNsnIDE0V0Dris2at9EIX7LAbfNfl/escB/ZxBwwZkQGlrU
uYVMW9xPWlee4TuZ6F9q
=cx1I
-END PGP SIGNATURE-


Re: A record from cache for request that resolved to (some) CNAMEs

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Mehmed,

On 21/09/15 13:17, Mehmed Kahric via Unbound-users wrote:
> Hi,
> 
> I have a similar issue as reported in Bug 669.
> 
> For some (one for now) CNAMEs we have a empty A record answer from 
> Unbound. Proper answer came from remote DNS as showed in Unbound
> log and tcpdump. Identical issue came from both us Unbound
> instances: - CentOS 6, Unbound 1.5.1 from EPEL, configured as
> recursive caching with forward-zone; - CentOS 7, Unbound 1.4.20
> from base, configured as authoritative, validating, recursive
> caching.
> 
> Log from first Unbound instance (with verbosity level 4) and from
> tcpdump is in attachment, and dig from client (with output) is:

What happens is the query for www.sensoray.com gives a CNAME to
sensoray.com and an A record.  But when queried specifically for the
sensoray.com name the A record does not exist, the A record in the
CNAME answer was a lie!

You can test this yourself, with dig sensoray.com @8.8.8.8 and this
returns no A record. (according to the verbosity 4 logs you give)

The A record is inserted in the same way some cache-poisoning attacks
work.  The cache-poisoning attack mitigations in unbound remove it.
(and unbound logs that it is scrubbed out of the answer).

Best regards,
   Wouter


> 
> --- C:\Users\Moi>dig www.sensoray.com @192.168.10.14
> 
> ; <<>> DiG 9.10.2-P3 <<>> www.sensoray.com @192.168.10.14 ;; global
> options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status:
> NOERROR, id: 38559 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1,
> AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;;
> QUESTION SECTION: ;www.sensoray.com.  IN  A
> 
> ;; ANSWER SECTION: www.sensoray.com.   5433IN  CNAME
> sensoray.com.
> 
> ;; Query time: 218 msec ;; SERVER: 192.168.10.14#53(192.168.10.14) 
> ;; WHEN: Fri Sep 18 11:13:30 Central Europe Daylight Time 2015 ;;
> MSG SIZE  rcvd: 59
> 
> C:\Users\Moi>dig sensoray.com @192.168.10.14
> 
> ; <<>> DiG 9.10.2-P3 <<>> sensoray.com @192.168.10.14 ;; global
> options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status:
> NOERROR, id: 5722 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0,
> AUTHORITY: 0, ADDITIONAL: 1
> 
> ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;;
> QUESTION SECTION: ;sensoray.com.  IN  A
> 
> ;; Query time: 31 msec ;; SERVER: 192.168.10.14#53(192.168.10.14) 
> ;; WHEN: Fri Sep 18 11:13:37 Central Europe Daylight Time 2015 ;;
> MSG SIZE  rcvd: 41
> 
> ---
> 
> 
> Regards, Mehmed
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=elOW
-END PGP SIGNATURE-


Re: [PATCH] unable to reload globs

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Dag-Erling,

On 17/09/15 18:39, Dag-Erling Smørgrav via Unbound-users wrote:
> When the configuration lexer processes an include directive and
> unbound is chrooted, it will attempt to strip the chroot directory
> from the front of the filename.  Unfortunately, this is omitted
> from the loop that handles globs.
> 
> The bug was reported to me by a 1.5.3 user and has been confirmed
> in 1.5.4.  The patch below is relative to 1.5.4 and applies to the
> latest trunk with a slight offset.

Thank you for the patch.  Fixed code base, included for the next release
.

Best regards, Wouter

> 
> Index: util/configlexer.lex 
> ===
>
> 
- --- util/configlexer.lex  (revision 3445)
> +++ util/configlexer.lex  (working copy) @@ -126,6 +126,10 @@ 
> #endif ; memset(&g, 0, sizeof(g)); +  if(cfg_parser->chroot &&
> strncmp(filename, cfg_parser->chroot, +
> strlen(cfg_parser->chroot)) == 0) { + filename +=
> strlen(cfg_parser->chroot); + } r = glob(filename, flags, NULL,
> &g); if(r) { /* some error */
> 
> DES
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=h0S+
-END PGP SIGNATURE-


Re: Unbound not always resolving immediately after start.

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Tomas,

On 15/09/15 09:55, Tomas Hozza via Unbound-users wrote:
> On 14.09.2015 14:15, Daisuke HIGASHI via Unbound-users wrote:
>> Hi,
>> 
>> SERVFAIL on tweakers.net seems to be from fix on CVE-2014-8500. 
>> This fix essentially limits number of query (to authoritative
>> servers) to resolve target qname. If a qname requires many query
>> to resolve it becomes SERVFAIL This situation often occurs when
>> cache is empty (e.g. just after starting unbound or cache flush)
>> 
>> bind-users have discussed same issue last year: 
>> https://lists.isc.org/pipermail/bind-users/2014-December/thread.html
>>
>>
>> 
Possible workarounds are to increase MAX_TARGET_COUNT
>> (iterator/iterator.h) to relax number of query limitation but it
>> may reduce robustness against CVE-2014-8500-related attack.
> 
> I think it is worth considering not having to recompile Unbound. It
> would be much nicer to have this configurable in unbound.conf. 
> Something similar like BIND allows by max-recursion-queries
> option.

What value should we use for MAX_TARGET_COUNT?   I'll increase the
compiled default to that value.  Easier than a configuration option
that the user can get wrong and then be vulnerable.

Best regards,
   Wouter

> 
> Tomas
> 
>> Regards, -- Daisuke HIIGASHI
>> 
>> 
>> 2015-09-11 18:39 GMT+09:00 Frank de Bot via Unbound-users 
>> :
>>> Hi,
>>> 
>>> Under FreeBSD I'm setting up a resolv-only unbound server.
>>> While testing I've noticed some domain do not resolve (server
>>> returns SERVFAIL)
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=Us9K
-END PGP SIGNATURE-


Re: unbound-control flush_zone behaviour w.r.t the DS record

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Paul,

On 16/09/15 04:35, Paul Wouters via Unbound-users wrote:
> 
> Hi,
> 
> Today I ran into an unexpected flush issue. A domain with DS record
> no longer signed its zone and became BOGUS. Once the registrar
> removed the DS record, I ran an unbound-control flush_zone on the
> zone, but I still received a SERVFAIL. Turns out the DS record of a
> domain is not flushed because it does not live in the child zone
> but in the parent zone.
> 
> I suggest to change the behaviour of unbound to also flush DS
> records of a zone in its parent with the flush_zone command.

The flush_zone command flushes the DS record too.  This works for me
(eg. lookup a domain, dig DS record, flush it, dig DS record - fresh
TTL).  But I understand the domain you had did not become non-bogus
after the flush?  Was something else not flushed that should be?

Best regards, Wouter
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=BVwV
-END PGP SIGNATURE-


Re: rfc6761 compliance

2015-09-22 Thread W.C.A. Wijngaards via Unbound-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi Robert, Andreas,

On 11/09/15 17:54, Robert Edmonds via Unbound-users wrote:
> A. Schulze via Unbound-users wrote:
>> Hello,
>> 
>> the RFC 6761 give some advise how caching DNS servers SHOULD 
>> handle queries for reserved domains. Mostly it say "do not send
>> queries to the root name servers"
>> 
>> ... point 4 in any case ... 
>> http://tools.ietf.org/html/rfc6761#section-6.2 ( domain "test."
>> ) http://tools.ietf.org/html/rfc6761#section-6.4 ( domain
>> "invalid." )
>> 
>> looks like unbound don't follow that "SHOULD" recommendations. it
>> this a miss-configuration on my side ?
> 
> I am also curious why these domains are not handled specially by
> Unbound as RFC 6761 recommends.  Interestingly, BIND has the exact
> same behavior as Unbound for these two domains.  (See
> https://bugs.debian.org/55032 for details.)
> 

It is not a particularly heavy root server load to mitigate, less code
is better and easier, the unblock-lan-zones statement is a frequently
asked question from our users.  That said, we could add new code for
this (and .onion?).

Best regards, Wouter
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=xeKM
-END PGP SIGNATURE-