Re: DNSSEC signing of an internal zone gains nothing (unless??)

2022-08-02 Thread Mark Andrews
Additionally authoritative servers for a zone are supposed to answer queries with RD=1 set with RA=0 if the client is not being offered recursion.  REFUSED is the wrong answer of the query name involves zones you serve. Only if you are a recursive only server should you be considering REFUSED. -- M

Re: Stopping ddos

2022-08-02 Thread Peter
On Tue, Aug 02, 2022 at 11:16:15PM +0200, Michael De Roover wrote: ! For my servers I'm using iptables rules to achieve ratelimiting. They ! look as follows: ! -A INPUT -p tcp -m tcp --dport 25 -m state --state NEW -m recent -- ! update --seconds 600 --hitcount 4 --name DEFAULT --mask 255.255.255.2

Re: Stopping ddos

2022-08-02 Thread Robert Moskowitz via bind-users
On 8/2/22 17:30, Nathan Ollerenshaw via bind-users wrote: On 8/2/22 1:02 PM, Robert Moskowitz wrote: Recently I have been having problems with my server not responding to my requests.  I thought it was all sorts of issues, but I finally looked at the logs and: You're being used as an unwill

Re: Stopping ddos

2022-08-02 Thread KEVIN DARCY via bind-users
I've never actually used RRL, but from the manual, it appears to default to a /24 prefix length to determine whether IPv4 clients are "similar" enough to be lumped in the same bucket, for RRL purposes. That might need to be tweaked, depending on the profile of whoever is attacking/abusing you. T

Re: Stopping ddos

2022-08-02 Thread Nathan Ollerenshaw via bind-users
On 8/2/22 1:02 PM, Robert Moskowitz wrote: Recently I have been having problems with my server not responding to my requests.  I thought it was all sorts of issues, but I finally looked at the logs and: Aug  2 15:47:19 onlo named[6155]: client @0xaa3cad80 114.29.194.4#11205 (.): view external

RE: Stopping ddos

2022-08-02 Thread Richard T.A. Neal
>> Any best practices on this? >> >> I am running bind 9.11.4 >> >> thanks > You could think about adding fail2ban to your server with some custom rules. > Helped us in a similar situation. You could also take advantage of BIND's built-in Response Rate Limiting which is explained here: https:

Re: Stopping ddos

2022-08-02 Thread Michael De Roover
For my servers I'm using iptables rules to achieve ratelimiting. They look as follows: -A INPUT -p tcp -m tcp --dport 25 -m state --state NEW -m recent -- update --seconds 600 --hitcount 4 --name DEFAULT --mask 255.255.255.255 --rsource -j DROP -A INPUT -p tcp -m tcp --dport 25 -m state --state NEW

Re: Stopping ddos

2022-08-02 Thread Grant Taylor via bind-users
On 8/2/22 2:02 PM, Robert Moskowitz wrote: Any best practices on this? It looks like you're dealing with A queries for the root domain. I've blocked this, and similar queries, via iptables firewall in the past. Also, make sure that you apply the same BIND ACL to the cache that you do for q

Re: Stopping ddos

2022-08-02 Thread Saleck
Dne úterý 2. srpna 2022 22:02:58 CEST, Robert Moskowitz napsal(a): > Recently I have been having problems with my server not responding to my > requests. I thought it was all sorts of issues, but I finally looked at > the logs and: > > Aug 2 15:47:19 onlo named[6155]: client @0xaa3cad80 114.29.1

Stopping ddos

2022-08-02 Thread Robert Moskowitz
Recently I have been having problems with my server not responding to my requests.  I thought it was all sorts of issues, but I finally looked at the logs and: Aug  2 15:47:19 onlo named[6155]: client @0xaa3cad80 114.29.194.4#11205 (.): view external: query (cache) './A/IN' denied Aug  2 15:47

Re: RE: DNSSEC adoption

2022-08-02 Thread Timothe Litt
On 02-Aug-22 13:51, Brown, William wrote: my guess is that they see dnssec as fragile, have not seen _costly_ dns subversion, and measure a dns outages in thousands of dollars a minute. No one wants to be this guy: http://www.dnssec.comcast.net/DNSSEC_Validation_Failure_NASAGOV_201201 18_FINA

Re: DNSSEC adoption

2022-08-02 Thread Grant Taylor via bind-users
On 8/2/22 11:51 AM, Brown, William wrote: Or perhaps some way of the client side deciding how to handle hard v./ soft failure. Wouldn't this require the client side being aware of DNSSEC and making decision based on it? Maybe it's just me, but I think client application side DNSSEC validati

Re: DNSSEC signing of an internal zone gains nothing (unless??)

2022-08-02 Thread Timothe Litt
On 02-Aug-22 13:18, Peter wrote: On Tue, Aug 02, 2022 at 11:54:02AM -0400, Timothe Litt wrote: ! ! On 02-Aug-22 11:09,bind-users-requ...@lists.isc.org wrote: ! ! > | Before your authoritative view, define a recursive view with the internal ! > ! zones defined as static-stub, match-recursive-only

RE: DNSSEC adoption

2022-08-02 Thread Brown, William
>>> my guess is that they see dnssec as fragile, have not seen _costly_ >>> dns subversion, and measure a dns outages in thousands of dollars a >>> minute. >> No one wants to be this guy: >> http://www.dnssec.comcast.net/DNSSEC_Validation_Failure_NASAGOV_201201 >> 18_FINAL.pdf >so, to me, a cru

Re: DNSSEC adoption

2022-08-02 Thread Randy Bush
>> my guess is that they see dnssec as fragile, have not seen _costly_ >> dns subversion, and measure a dns outages in thousands of dollars a >> minute. > No one wants to be this guy: > http://www.dnssec.comcast.net/DNSSEC_Validation_Failure_NASAGOV_20120118_FINAL.pdf so, to me, a crucial question

Re: bind-users Digest, Vol 4031, Issue 3

2022-08-02 Thread Peter
On Tue, Aug 02, 2022 at 11:54:02AM -0400, Timothe Litt wrote: ! ! On 02-Aug-22 11:09, bind-users-requ...@lists.isc.org wrote: ! ! > | Before your authoritative view, define a recursive view with the internal ! > ! zones defined as static-stub, match-recursive-only "yes",  and a ! > ! server-addre

Question about linking jemalloc with Bind 9.18.x when doing the compile.

2022-08-02 Thread Bhangui, Sandeep - BLS CTR via bind-users
Hello all We are getting ready to test Bind 9.18.x. Currently we are running the latest version of 9.16.x branch. We have downloaded and successfully installed the jemalloc module on the Server ( RHEL 7.9 OS) and getting ready to compile the latest version of Bind 9.18.x. Can someone please po

Re: bind-users Digest, Vol 4031, Issue 3

2022-08-02 Thread Timothe Litt
On 02-Aug-22 11:09, bind-users-requ...@lists.isc.org wrote: | Before your authoritative view, define a recursive view with the internal ! zones defined as static-stub, match-recursive-only "yes",  and a ! server-address of localhost. Uh? Why before? Because each request attempts to match the

RE: High memory consumption in bind 9.18.2

2022-08-02 Thread Dmitri Pavlov
Thank you very much, Ondrej, There is a KB https://kb.isc.org/docs/bind-memory-consumption-explained == Overview BIND users upgrading from BIND 9.11 versions to BIND 9.16 may notice increased memory consumption. This article explains in detail how BIND allocates memory in 9.16, and 9.17/9.18

RE: High memory consumption in bind 9.18.2

2022-08-02 Thread Dmitri Pavlov
Hi, #9.18.5 Configuration summary: --- Optional features enabled: Memory allocator: jemalloc DNSSEC validation active by default (--enable-auto-validation) --

Re: High memory consumption in bind 9.18.2

2022-08-02 Thread Anand Buddhdev
Dmitri, Just downloading, building and installing the latest version of jemalloc like this doesn't mean that BIND will find and use it. BIND has to be compiled with the correct compiler and linker flags to use this version. Are you certain BIND is using your installed version? -- Anand On 0

Re: High memory consumption in bind 9.18.2

2022-08-02 Thread Ondřej Surý
Well, then I don’t know the reason for the difference in your case. And I don’t personally see a compelling reason to investigate a 10% increase in artificial scenario like this since it apparently doesn’t apply to all scenarios. However, you are free to do the further investigation yourself. W

RE: High memory consumption in bind 9.18.2

2022-08-02 Thread Dmitri Pavlov
Hi, Resending ... bad format. dnf install wget bzip2 gcc make -y wget https://github.com/jemalloc/jemalloc/releases/download/5.3.0/jemalloc-5.3.0.tar.bz2 bzip2 -d jemalloc-5.3.0.tar.bz2 && tar -xf jemalloc-5.3.0.tar && cd jemalloc-5.3.0 ./configure make make install reboot -f Dmitri. -O

RE: High memory consumption in bind 9.18.2

2022-08-02 Thread Dmitri Pavlov
dnf install wget bzip2 gcc make -y wget https://github.com/jemalloc/jemalloc/releases/download/5.3.0/jemalloc-5.3.0.tar.bz2 bzip2 -d jemalloc-5.3.0.tar.bz2 && tar -xf jemalloc-5.3.0.tar && cd jemalloc-5.3.0 ./configure make make install reboot -f -Original Message- From: Ondřej Surý Sen

Re: High memory consumption in bind 9.18.2

2022-08-02 Thread Ondřej Surý
I don’t see jemalloc anywhere in your setup scripts. Preferably use the latest upstream jemalloc version available. Ondřej -- Ondřej Surý — ISC (He/Him) My working hours and your working hours may be different. Please do not feel obligated to reply outside your normal working hours. > On 2. 8

RE: High memory consumption in bind 9.18.2

2022-08-02 Thread Dmitri Pavlov
Hi, Thank you very much for your feedback, Ondrej. Sharing the steps. Very simple: configure -> make -> make install. Very simple configuration. Just the zone file is big. Please, see the attached. 1. I followed the instructions from here https://bind9.readthedocs.io/en/v9_18_4/chapter10.html

RE: DNSSEC adoption

2022-08-02 Thread Brown, William
> my guess is that they see dnssec as fragile, have not seen _costly_ dns > subversion, and measure a dns outages in thousands of dollars a minute. >randy No one wants to be this guy: http://www.dnssec.comcast.net/DNSSEC_Validation_Failure_NASAGOV_20120118_FINAL.pdf Confidentiality Notice: T

Re: DNSSEC signing of an internal zone gains nothing (unless??)

2022-08-02 Thread Peter
On Tue, Aug 02, 2022 at 05:51:28AM -0400, Timothe Litt wrote: ! You can get the AD flag set, with a bit of extra work.  I've done this for ! years. Thanks for Your message, Timothe. After investigating the matter, I had figured out a similar approach - but didn't know if this is a recommended or

Re: Bind 9.11/RHEL7 Server Freezes FUTEX_WAKE_PRIVATE

2022-08-02 Thread Ondřej Surý
Just use /dev/urandom as random device after reading a single byte from /dev/random to ensure the CSPRNG has been seeded. The unsuitability of /dev/urandom for cryptographic purposes is just a myth. You are more likely affected by seeding all the instances from the same seed saved in the image

Re: Bind 9.11/RHEL7 Server Freezes FUTEX_WAKE_PRIVATE

2022-08-02 Thread Timothe Litt
On 01-Aug-22 18:29, Grant Taylor wrote: On 8/1/22 4:21 PM, Greg Choules via bind-users wrote: Off the top of my head, could it be this? random-device ... BIND will need a good source of randomness for crypto operations. Drive by plug:  If it is lack of entropy, try installing and running

Re: DNSSEC signing of an internal zone gains nothing (unless??)

2022-08-02 Thread Timothe Litt
On 01-Aug-22 12:15, John W. Blue wrote: While that extra overhead is true, it is more accurate to say that if internal clients are talking directly to an authoritative server the AD flag will not be set.  You will only get the AA flag.  So there is nothing to be gained from signing an interna