[Opendnssec-user] Must have DNS notify?

Johan Ihrén johani at netnod.se
Thu Sep 5 20:56:30 UTC 2013


Hi,

On Aug 8, 2013, at 19:13 , Joe Abley wrote:

> On 2013-08-08, at 12:39, Havard Eidnes <he at uninett.no> wrote:
> 
>>> Why not configure regular nameserver on the same host as
>>> opendnssec instead of replicating full functionality in
>>> opendnssec itself?
>> 
>> Well...  This may at least partly stem from my local wishes for
>> deployment.  I wanted to not touch the current originating name
>> server, and continue to maintain the zones there, and use
>> OpenDNSSEC as a "bump on the wire" between the now hidden master
>> and the new distribution master name server.
>> 
>> In other words, I wanted to use "DNS in", and at the same time
>> "DNS out" for transferring respectively unsigned and signed
>> zones.  After all, that is supposed to be a supported feature,
>> now, with 1.4?
> 
>> If I want to use the "DNS in" adapter, it seems to me that
>> OpenDNSSEC lays claim to port 53, so that presents an additional
>> challenge if you want to run a real name server in parallel with
>> OpenDNSSEC.
> 
> Well, there's nothing to say you have to bind a private-use nameserver to port 53. You can bind to a different port, and configure your origin masters (for the unsigned zones) to notify a different port.
> 
>> (Even though you can configure the signer to listen
>> to another port than 53, I don't immediately see a way for me to
>> configure BIND to send notify messages to another port than port
>> 53.)
> 
> also-notify {
>    target-address port target-port;
> };
> 
> I'm not suggesting that what you say doesn't make sense, just that there are workarounds that might well be acceptable.

Speaking of tweaking the ports used... what about the source address used?

I'm playing with a setup similar to what Håvard has. In my case I have a hidden master on address 10.1.0.1, ODS on 10.1.0.2 and a slave for the signed version of the zone on 10.1.0.3. The problem is that 10.1.0.1 and 10.1.0.2 are two IP aliases on the same box. So I have tweaked the nameserver on 10.1.0.1 to Notify 10.1.0.2 which began to work when I realised I had to lock the source address used (otherwise it will Notify 10.1.0.2 with a source of 10.1.0.2, which ODS correctly ignores).

However, that just caused me to bump my head on the same thing going in the opposite direction: when ODS requests a zone transfer from 10.1.0.1 it is refused by the ACL on the hidden master, due to the request coming *from* 10.1.0.1:

OpenDNSSEC logs:
Sep  5 20:37:27 master ods-signerd: [xfrd] bad packet: zone bravo.dnslab received error code REFUSED from 10.1.0.1
Sep  5 20:42:07 master ods-signerd: [xfrd] bad packet: zone bravo.dnslab received error code REFUSED from 10.1.0.1

Master nameserver logs (in this case it was Knot, but that's obviously irrelevant):
2013-09-05T20:37:27 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60434': Operation not permitted.
2013-09-05T20:37:27 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60433': Operation not permitted.
2013-09-05T20:37:28 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60432': Operation not permitted.
2013-09-05T20:42:07 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60431': Operation not permitted.
2013-09-05T20:42:07 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60430': Operation not permitted.
2013-09-05T20:42:08 [notice] Outgoing AXFR of 'bravo.dnslab.' to '10.1.0.1 at 60429': Operation not permitted.

Could we please have an option to force the source address that ODS uses? Or, quite possibly, am I just hopelessly confused here and there is some way to do that already?

Regards,

Johan

PS. Sure, I realise that this could be done in several other ways, using separate boxes, different ports, ACLs based on keys rather than addresses, etc. But still, this ought to work. There's a reason why all nameservers these days have options for forcing the source address used, and the same needs apply to ODS now that it is starting to behave like a nameserver.




More information about the Opendnssec-user mailing list