Could you please flush your DNS cache (deb.knot-dns.cz
should point to sophie.nic.cz now) and try again?
The debarchive got broken and I couldn't fix it, so
it has been replaced by reprepro.
In case you can't flush your caches, please just temporarily
change deb.knot-dns.cz to sophie.nic.cz.
Also the repository is now signed:
# wget -O - http://deb.knot-dns.cz/debian/apt.key | apt-key add -
Full instructions can be found here:
http://deb.knot-dns.cz/debian/README.txt
Ondrej
--
Ondřej Surý -- Chief Science Officer
-------------------------------------------
CZ.NIC, z.s.p.o. -- Laboratoře CZ.NIC
Americka 23, 120 00 Praha 2, Czech Republic
mailto:ondrej.sury@nic.cz http://nic.cz/
-------------------------------------------
----- Original Message -----
> From: "Leoš Bitto" <leos.bitto(a)gmail.com>
> To: knot-dns-users(a)lists.nic.cz
> Sent: Tuesday, September 9, 2014 12:06:45 PM
> Subject: Re: [knot-dns-users] problem with debian repository
> On Tue, Sep 9, 2014 at 9:14 AM, Ondřej Caletka <ondrej.caletka(a)gmail.com> wrote:
>> Dne 22.8.2014 09:52, Peter Hudec napsal(a):
>>> Hi,
>>>
>>> this mail is directed for debian repository maintainers.
>>>
>>> The debian repository is not working properly, the Packages(.gz) and
>>> Sources(.gz) files are empty.
>>>
>>
>> I'm observing same problem. However, I've noticed that latest version of
>> Knot is available in official wheezy-backports tree.
>>
>
> http://deb.knot-dns.cz/debian/dists/wheezy/ does not work for me, too.
> However I do not agree with the availability in the official
> wheezy-backports
> (http://ftp.cz.debian.org/debian/dists/wheezy-backports/ in my case) -
> the previous version 1.5.1 was not there until the last week, and the
> current version 1.5.2 is not there at all (which might actually be a
> good thing due to https://gitlab.labs.nic.cz/labs/knot/issues/294).
>
>
> Leoš Bitto
> _______________________________________________
> knot-dns-users mailing list
> knot-dns-users(a)lists.nic.cz
> https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
I have following issue with Knot: when I try to stop it by command
/etc/init.d/knot stop then the daemon is still running. If i run command
knotc stop then it's stopped but immediately run again. If I kill it by
command kill, it's the same...
As I found the /etc/init.d/knot is not working at all and Knot is
probably run during boot by /etc/init/knot.conf and I'm not able to
control it. The "unkillable" proccess is named /usr/sbin/knotd -c
/etc/knot/knot.conf
My environment: Debian 7 AMD64, OpenVZ container, kernel
2.6.32-openvz-042stab092.2-amd64, Knot 1.5.0-1
I tried to install Knot on another older machine where is Debian 7 too
but upgraded from 6 and it's KVM virtual machine. There it works
correctly via init.d script and the proccess is named /usr/sbin/knotd
*-d* -c /etc/knot/knot.conf
Do you have an idea why it's working on older machine correctly and on
the second with OpenVZ not?
Thanks for any help.
Zdenek Z.
Hello Knot folk,
I'm building Knot RPM packages for use on CentOS 7, and I have to write
systemd unit files. Before I write anything, I'd love to hear from
others who may already have done such work, to learn from it. Let me
describe my ideas.
On my existing Knot servers running on CentOS 6 with upstart, I have 2
upstart scripts, viz. knot.conf, and knot-instance.conf. The knot.conf
upstart script looks in /etc/knot for .conf files, and for each one,
runs knot-instance with the config file as a parameter. This way, a
simple "start knot" will start all instances.
In systemd, there is better support for instances, so I want to create a
knot@.service template unit, and a knot.target target unit. Then, I can
create new instances with "systemctl enable knot(a)conf1.conf" and
"systemctl enable knot(a)conf2.conf". Finally, running "systemctl start
knot.target" should start all configured instances. Does this sound
reasonable?
I would also like to know about Knot's built-in support for systemd. I
can't find any documentation about it. Could one of the devs please
describe what Knot actually does if it's compiled with systemd support?
Would you mind adding this information to the online documentation?
Regards,
Anand
Hello list!
Today, CZ.NIC Labs are releasing Knot DNS version 1.5.1!
Let's discuss bugfixes first. Most notably, we've fixed a bug in
automatic DNSSEC signing: domain names in RDATA were not lowercased
before signing, resulting in bogus signatures. Other interesting
bugfixes include proper handling of DDNS prerequisites and some TSIG and
EDNS corner cases.
As for the new features, we've added a basic support for logging using
systemd journal. At the moment, log messages related to zone have the
ZONE field set, which means that you can easily filter log messages
based on zone name criteria. We plan to add more fields in the future to
allow more fine-grained filtering. We're looking forward to your
suggestions in this area.
Moreover, we've improved DDNS performance for large zones by grouping
incoming updates together and executing them as a bulk. This partially
mitigates problems with RCU and copying the zone structure, but dynamic
updates' running time is still proportional to size of the zone and not
to the size of the actual updates. Improving this is one of our top
priorities, and code in this release will help us to do so.
Finally, we've improved and unified format of logging messages. Most
notable, each logging message concerning a zone is now prepended with
[zone name]. If you parse the output of log files, be sure to update
your scripts.
Further, we now enforce a more strict policy for DNSSEC signing keys:
at least one active pair of KSK and ZSK keys of the same algorithm must
be present at all times, or Knot will refuse to sign the zone.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.5.1/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.5.1.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.5.1.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.5.1.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.5.1.tar.xz.asc
Be sure to let us know if you run into any problems. Have a nice day and
thanks for using Knot DNS!
Jan
--
Jan Kadlec, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
hello,
i'm operating a small hidden master server (four zones spread out to two
external NS servers), and want to introduce dnssec.
so far, i have kept my zone files in /etc under version control, but now
knot starts overwriting them, which is kind of important because of the
serial number increments, but also removes file structure, and comments
and generally messes with the changelog.
i could not quite infer from the documentation what the recommended work
flow is in this situation:
* will things work if i just make the zone files read-only for bind?
* should i keep the original files separate and copy them over to the
knot-writable destinations for each refresh? if yes, can that be
automated from within knot?
in either case, i have to take care of the serial numbers. my current
numbering scheme (YYYYMMDDXX with year, month, day and per-day number)
produces sufficiently few automated changes that incrementing by 10 each
time i edit the unsigned file on one deay would work, but what is best
practice there?
best regards
chrysn
ps. please keep me in cc when replying, as i'm not subscribed to the
list.
--
There's always a bigger fish.
-- Qui-Gon Jinn
Hello Knot DNS users!
After two release candidates, CZ.NIC Labs proudly release Knot DNS 1.5.0
final. This new version differs greatly from the old 1.4 branch - we've
rewritten quite a big portion of our code, and we've built a foundation
for next cool features to come.
But you've probably read about the changes in 1.5.0 in the previous
release messages, so here's just a brief list of improvements that are
visible to users: Optional query modules (currently we have dnstap and
response synthesization modules implemented), lower memory footprint and
improved zone events handling (for those of you with problems with zone
expiring, 1.5.0 should not have this problem). We've also done a lot of
under-the-hood changes, with lots of refactoring and massive code
reductions. Apart from all this, we've been very busy writing tests -
our current test code coverage is around 75 percent.
Here are the changes we've made from 1.5.0-rc2:
Features:
- DDNS forwarding reimplemented
Improvements:
- Transfer sizes logged in bytes if needed
- Logging outgoing NOTIFY messages
- Logging unauthorized incoming NOTIFYs
Bugfixes:
- Zone flush planning after bootstrap
- Incorrect incoming AXFR message sizes
- DDNS signing changes were freed too soon, with possibility of stale data
- knotc remote control key handling
Changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.5.0/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.5.0.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.5.0.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.5.0.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.5.0.tar.xz.asc
We've done all we could to test Knot DNS 1.5.0 on our end, now it's time
you gave it a try! We hope you'll be as happy with it as we are.
Today's thanks for bug reports go to Anand Buddhdev and Motomu Utsumi.
Have a nice day and thanks for using Knot DNS!
Jan
--
Jan Kadlec, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hi Maren,
you should turn the explicit notification
both in bind and knot.
For Knot use "notify-out <slave1> <slave2>;" + "xfr-out <slave1> <slave2>;"
See the documentation:
https://www.knot-dns.cz/static/documentation/html/configuration.html#master…
For Bind use "notify explicit;" + "also-notify;", see:
http://www.zytrax.com/books/dns/ch7/xfer.html#notify
Ondrej
--
Ondřej Surý -- Chief Science Officer
-------------------------------------------
CZ.NIC, z.s.p.o. -- Laboratoře CZ.NIC
Americka 23, 120 00 Praha 2, Czech Republic
mailto:ondrej.sury@nic.cz http://nic.cz/
-------------------------------------------
----- Original Message -----
> From: "Maren S. Leizaola" <leizaola(a)udr.hk.com>
> To: knot-dns-users(a)lists.nic.cz
> Sent: Monday, July 7, 2014 1:32:52 PM
> Subject: [knot-dns-users] Two hidden masters - sending notifications to public slaves.
> Hi,
>
> We are setting up to do zone generations of two separate hidden masters
> which will take turns on the zone generation.
>
> Public/visible DNS servers "should" get notifies from both servers and
> select the one with the with the highest serial number.
>
> I am planning to run bind on one server and knot on the other. On bind i
> have the issue that it would not send notifies to the name servers until
> I turned on "notify-soa yes;". However I realise that his will only
> notify one single DNS server and introduces a single point of failure.
>
> Does Knot have any issues sending the notifies. How do I go about
> getting this done?
>
> Regards,
> Maren
>
> _______________________________________________
> knot-dns-users mailing list
> knot-dns-users(a)lists.nic.cz
> https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
Hello,
after upgrading to new stable version 1.4.7 we noticed a problem with
zones, which are expiring (i've seen some bugfix -expiration timer). It
happened second time now, and i think its happening every week (7days).
Zones, which expired are selected randomly, count of expired zones is ~8.
expired zones are listed like this:
somezone.net. type=slave | serial=0 | bootstrap idle |
After manually refreshing zone everything works fine.
TTL is 86400 - 1 day
We are using knot as slave dns. Bind9 is master.
Thanks for some advices.
Jakub
Hello everybody,
We're currently testing Knot for a slave server with a BIND master,
and we've noticed that NOTIFY messages from this master are not being
processed by Knot. As I understand, BIND uses a random source port for
NOTIFY messages, as a precaution against attacks. Also, if I
understand correctly, when I add a remote master to a zone in Knot, if
I don't specify a port for it then it defaults to 53-
This leads me to believe that Knot is rejecting NOTIFY messages from
the BIND master, because they come from an unexpected, random port. Is
this correct? Can this situation be rectified to allow NOTIFY messages
from random ports?
Thank you very much in advance.
Gonzalo Muñoz
NIC Chile
Hi,
We are setting up to do zone generations of two separate hidden masters
which will take turns on the zone generation.
Public/visible DNS servers "should" get notifies from both servers and
select the one with the with the highest serial number.
I am planning to run bind on one server and knot on the other. On bind i
have the issue that it would not send notifies to the name servers until
I turned on "notify-soa yes;". However I realise that his will only
notify one single DNS server and introduces a single point of failure.
Does Knot have any issues sending the notifies. How do I go about
getting this done?
Regards,
Maren
Hello,
I'm trying to understand if Knot can solve our performance problem with big scale dynamic DNS deployment. Currently we use BIND and the performance of Dynamic Updates is insufficient for our requirements. Doing some research I understood that BIND processes updates sequentially and can't really benefit from SMP.
I understand how RCU allows parallel reads with updates. But reads is not an issue in our deployment. My question is, does Knot able to process multiple updates in parallel (and not sequentially) and provide a better scale for _updates_?
As far as I understand it depends on data structure hierarchy implemented in Knot.
--
Alex Massover | Telefónica Digital
Architect
M +972-54-2279512
alex(a)jajah.com<mailto:alex@jajah.com>
Hello,
We have Knot 1.4.6 on CentOS installation.
When doing NAPTR ddns update, like this:
nsupdate
> server x.x.x.x
> update add 3.1.1.1.1.1.1.1.1.2.7.9.9.our.domain.com. 172800 NAPTR 1 1 "u" "E2U+sip" "!^.*$!sip:123@freeswitch.org!" .
> send
; Communication with server failed: timed out
It fails with:
knotd: libknot/rrset.c:1703: rrset_serialize: Assertion `size_one == rr_size' failed.
Aborted
No issues with ddns updates with TXT records.
--
Alex Massover | Telefónica Digital
Architect
M +972-54-2279512
alex(a)jajah.com<mailto:alex@jajah.com>
Le samedi 14 juin 2014 à 00:10 +0200, Jan Kadlec a écrit :
> Hello,
> one more thought: Could you please check your master log file for this
> warning message: (log for category: zones and severity: warning has to
> be enabled) "Zone file for '...' changed, but serial didn't - won't
> create changesets."? This happens when you change the zone, but the
> serial remains the same.
> Note that Knot will change the serial when automatic DNSSEC is enabled,
> so before creating the zone file in the script, you have to get the
> current serial from server and increment that serial. Updating your zone
> files using this approach might help you, but it is nevertheless a bug.
Hello,
I had this warning sometimes. I edit my zone files with emacs in zone
mode, so the serial is auto-incrementing, but I have to save it twice to
pass over the dnssec auto-increment.
I put a check in my makefiles to ensure the old serial is lower than the
new one.
Look like it works with that, here was my mistake :)
Thanks a lot !
Regards,
--
Bastien Durel <bastien+knot(a)durel.org>
Hello
I have some zones in 2 knots in a master-slave relation
When I update zones in master, there are replications issues in slave:
- sometime changed records are duplicated (old and new value)
- sometime removed records persists
- sometime the RRSIG records are duplicated (old and new value)
I often have to erase slave zones and to restart knot to get correct zone.
I update master zone via makefiles that re-create (unsigned) zone files
and then reload knot via knotc
What is my mistake ?
Regards,
--
Bastien
Hi Maren,
it would never be the 'same' zone file, since you have different
full labels (foo.example.net is different from foo.example.com) per
zone after loading them into the memory.
I would suggest that this use case scenario would be best served by
some new query processing dynamic module[1] that you would configure
for all those zones and that would always respond with the same data.
1. See the Knot DNS 1.5.0rc1 release notes and documentation
Ondrej
--
Ondřej Surý -- Chief Science Officer
-------------------------------------------
CZ.NIC, z.s.p.o. -- Laboratoře CZ.NIC
Americka 23, 120 00 Praha 2, Czech Republic
mailto:ondrej.sury@nic.cz http://nic.cz/
-------------------------------------------
----- Original Message -----
> From: "Maren S. Leizaola" <leizaola(a)udr.hk.com>
> To: knot-dns-users(a)lists.nic.cz
> Sent: Thursday, June 12, 2014 7:50:02 PM
> Subject: [knot-dns-users] Parking page with a large number of zones pointing the the same file.
> Hello,
> I would like to know what the memory allocation/usage
> would be like if say I point 1M zones to the same zone file.
>
> Will it allocate memory for each of the zones or can it just allocate
> memory once as it is the same zone file ?
>
> Regards,
> Maren.
> _______________________________________________
> knot-dns-users mailing list
> knot-dns-users(a)lists.nic.cz
> https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
Hello,
I would like to know what the memory allocation/usage
would be like if say I point 1M zones to the same zone file.
Will it allocate memory for each of the zones or can it just allocate
memory once as it is the same zone file ?
Regards,
Maren.
I'm running 1.5.0-rc1. Here's a question:
# knotc zonestatus | grep idle
25.93.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing disabled
48.31.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing disabled
49.31.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing disabled
164.86.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing
disabled
165.139.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing
disabled
209.193.in-addr.arpa. type=slave | serial=0 | idle | DNSSEC signing
disabled
What is the meaning of the "idle" status?
It would be good if the output of "zonestatus" were explained in detail
(in the man page of knotc or in the manual, or both), along with an
explanation of all the various states that a zone can be in.
Regards,
Anand
Hi Peter,
On 4 June 2014 12:08, Peter Andreev <andreev.peter(a)gmail.com> wrote:
> Just a few thoughts to start from:
>
> 1. Masters have to have possibility to exchange their states to each
> other, including zones, journals. This means that "multi-master"
> should be a "per-zone" feature;
It is, the multi-master is enabled like:
example.com {
xfr-in master1, master2;
}
and the "master2" is then used for failover if the zone transfer with
"master1" fails for example.
Usually, you don't need multiple masters until you have a specific use
case for that.
> 2. Each master in case of dynamic update has to forward this update to
> other masters. This means that server should look to its configuration
> rather than to mname field;
That is true, but this may also cause problems with some specific
setups. Like for example hidden master
that can only sign the zone, but can't forward dynamic updates and
such. That is not to say relying on mname
is always the best. Truth is, I don't like the idea of
authoritative servers forwarding messages, but it seems there are
legitimate use cases for that.
Maybe we could let the zone operator override the mname with the
configuration and put a warning in there,
or is there a complete error-proof solution I'm not aware of?
> 3. In case of first start there should be option for operator to tell
> server if it starts as slave and has to sync from other masters, or it
> should consider itself as master and provide data to others.
As of now, the zone is treated as master unless it has at least one
remote in the "xfr-in" option.
Maybe it's not very intuitive, but we have a new configuration (to
allow remote configuration as well) in planning,
so this could be something to consider.
> There is a lot to discuss actually, for example, what to do with
> DNSSec? How to handle requests from slaves on first start?
>
> As for me, such master should be specialized software with main focus
> not on performance, but on management and inter-server communication.
I tend to agree, I originally wanted to support multiple masters only
to provide failover for zone transfers.
> 2014-06-04 13:35 GMT+04:00 Alex Massover <alex(a)jajah.com>:
>> Hi,
>>
>>
>>
>> Please see inline
>>
>>
>>
>> From: marek(a)vavrusa.com [mailto:marek@vavrusa.com] On Behalf Of Marek
>> Vavruša
>> Sent: 04 June 2014 11:13
>> To: Alex Massover
>> Cc: knot-dns-users(a)lists.nic.cz
>>
>>
>> Subject: Re: [knot-dns-users] Knot DNS 1.5.0 first release candidate!
>>
>>
>>
>> Hi Alex, the "xfr-in" statement always allowed a list of remotes as masters.
>> However, only the first one was always used. With the 1.5.0, other remotes
>> are used for
>>
>> failover should the first master be inaccessible or returning lame answers.
>> There isn't any advanced functionality like load balancing or anything, do
>> you need something like that?
>>
>> Also, the update forwarding to primary master is not reimplemented in the
>> rc1 (but will be in final, see KNOWN_ISSUES). In that case, the things get
>> tricky - in past, we used the first remote in the list
>>
>> as a primary. With the list now, we should probably take the primary NS as
>> is in the SOA of the zone. Thoughts?
>>
>>
>>
>> [Alex] Will this guarantee data consistency, providing there are a number of
>> slave servers with update forwarding?
>>
>> Also, I'm not sure I understand how the second master gets the updated zone,
>> when the first fails.
>>
>>
>>
>>
>>
>> Best,
>>
>> Marek
>>
>>
>>
>> On 4 June 2014 09:35, Alex Massover <alex(a)jajah.com> wrote:
>>
>> Hello,
>>
>>
>>
>> I'm not able to find any information about how multi-master works.
>>
>>
>>
>> Can someone point me to the info, please? Does it work with dynamic updates?
>>
>>
>>
>> BR, Alex.
>>
>>
>>
>> From: knot-dns-users-bounces(a)lists.nic.cz
>> [mailto:knot-dns-users-bounces@lists.nic.cz] On Behalf Of Marek Vavruša
>> Sent: 03 June 2014 21:31
>> To: knot-dns-users(a)lists.nic.cz
>> Subject: Re: [knot-dns-users] Knot DNS 1.5.0 first release candidate!
>>
>>
>>
>> Here are the correct links for those baffled by my (admittedly) poor mail
>> formatting skills.
>>
>>
>>
>> Changelog:
>> https://gitlab.labs.nic.cz/labs/knot/blob/v1.5.0-rc1/NEWS
>>
>> Sources:
>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.gz
>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.xz
>>
>> GPG signatures:
>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.gz.asc
>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.xz.asc
>>
>>
>>
>> Marek
>>
>>
>>
>> --
>>
>> Marek Vavrusa, Knot DNS
>>
>> CZ.NIC Labs http://www.knot-dns.cz
>>
>> -------------------------------------------
>>
>> Americká 23, 120 00 Praha 2, Czech Republic
>>
>> WWW: http://labs.nic.czhttp://www.nic.cz
>>
>>
>> On 3 June 2014 20:10, Marek Vavruša <marek.vavrusa(a)nic.cz> wrote:
>>>
>>> Hi Everyone,
>>>
>>> with the 1.5.0 mostly feature-complete, us jolly folks at the CZ.NIC Labs
>>> thought
>>> that the time has come to share it with you in form of a first release
>>> candidate.
>>> I'd like to tell you a story first - I was browsing through the NEWS file,
>>> looking back
>>> at the things we've done since the 1.0.0 two years ago. Oddly enough, one
>>> of the new
>>> features was an "optimized memory consumption", and I've seen this repeat
>>> a few times.
>>> I would have thought that the Knot DNS consumes zero memory by now, but it
>>> appears it doesn't
>>> work that way. The law of diminishing return still applies, and the
>>> changes in between the versions
>>> seem almost insignificant. Sometimes at least (recently, I've added a
>>> benchmark of 1M small zones to our benchmark [1], which showed how much
>>> memory did we need per each zone).
>>> We addressed that. And despite the new preallocated packet buffers and
>>> other features, we still managed to cut down the resource requirements for
>>> TLD use cases for about 20%.
>>> My point is, while the 20% does not seem that impressive alone, but the
>>> steep release-over-release tendency of smaller memory footprint and faster
>>> startup/answer performance just shows the unrelenting attention to the
>>> seemingly insignificant stuff, like structure alignment or packet
>>> distribution. That's what we're commited to.
>>>
>>> Now, what's actually new in the 1.5.0? I've touted the major changes under
>>> the bonnet earlier this
>>> year and boy, we've been busy. One of the major changes is the new query
>>> processing, which allowed us to do several cool things. The query processing
>>> is broken down to the set of step,
>>> that are built like a LEGO, and each of the steps can be altered by the
>>> modules.
>>> We have two modules now - a module capable of synthesizing forward/reverse
>>> records according to the configuration template. This for example solves the
>>> IPv6 reverse records problem (SLAAC as well), as we don't have to generate
>>> massive zones, but rather create the records on the fly.
>>> The second module is a dnstap query/response log. Heard about the dnstap
>>> [2]? It's a pretty ingenious solution to the fine-grained capture of the DNS
>>> traffic without compromising the performance.
>>>
>>> By the way, the utilities (kdig) support it too and you can either capture
>>> or replay queries now.
>>> The good thing about modules is that it allows us to streamline (about 12K
>>> LOC less) the core functionality and extend the server at the some time.
>>> Think RRL, load balancing, geo-aware answers.
>>>
>>> What about other things? As for the visible changes, for instance a
>>> multi-master failover, improved logs, asynchronously loaded zones, much more
>>> accurate "knotc memstats" and "zonestatus" tools, new user manual ...
>>> I could probably bore you to death with the nitty gritty stuff, so check
>>> out the changelog to know more. That being said, I'd like to ask your help.
>>> The new stuff, like the asynchronous zone loading or logging, change the
>>> usability a little. Did we break your scripts or use case? Compliment,
>>> cheeky remark or angry rant? Please let us know, we'd like to get most of
>>> the kinks ironed out till the final release. Thank you.
>>>
>>> Changelog:
>>> https://gitlab.labs.nic.cz/labs/knot/blob/v1.5.0-rc1/NEWS
>>>
>>> Sources:
>>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.gz
>>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.xz
>>>
>>> GPG signatures:
>>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.gz.asc
>>> https://secure.nic.cz/files/knot-dns/knot-1.5.0-rc1.tar.xz.asc
>>>
>>> [1] http://knot-dns.labs.nic.cz/pages/benchmark.html#tab-resource-usage
>>> [2] http://dnstap.info/
>>>
>>> Kind Regards,
>>>
>>> Marek
>>>
>>> --
>>> Marek Vavrusa, Knot DNS
>>> CZ.NIC Labs http://www.knot-dns.cz
>>> -------------------------------------------
>>> Americká 23, 120 00 Praha 2, Czech Republic
>>> WWW: http://labs.nic.czhttp://www.nic.cz
>>
>>
>>
>>
>> _______________________________________________
>> knot-dns-users mailing list
>> knot-dns-users(a)lists.nic.cz
>> https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
>>
>
>
>
> --
> Is there any problem Exterminatus cannot solve? I have not found one yet.
Hi Anand,
I see this could be a problem, is the backoff causing the delays for
failed zone transfers?
There is a configuration option "background-workers" with which you
can limit the number of parallel requests,
but if you can email me some statistics about failed/passed transfers
and transfers/second we can probably work out
some more clever queuing.
Cheers,
Marek
On 4 June 2014 12:11, Marek Vavruša <marek(a)vavrusa.com> wrote:
> Hi Anand,
>
> I see this could be a problem, is the backoff causing the delays for
> failed zone transfers?
> There is a configuration option "background-workers" with which you
> can limit the number of parallel requests,
> but if you can email me some statistics about failed/passed transfers
> and transfers/second we can probably work out
> some more clever queuing.
>
> Cheers,
> Marek
>
> On 4 June 2014 12:06, Anand Buddhdev <anandb(a)ripe.net> wrote:
>> On 03/06/2014 20:10, Marek Vavruša wrote:
>>
>>> Hi Everyone,
>>>
>>> with the 1.5.0 mostly feature-complete, us jolly folks at the CZ.NIC Labs
>>> thought
>>> that the time has come to share it with you in form of a first release
>>> candidate.
>>
>> Great stuff Marek!
>>
>> I've started an instance of 1.5.0-rc1 with a few thousand slave zones
>> configured. The bootstrap takes quite a while as Knot has to XFR all the
>> zones in.
>>
>> It looks like Knot is hitting our master very hard, because it seems to
>> want to make too many parallel connections. I see this in the logs:
>>
>> 2014-06-04T09:58:51 [error] AXFR of 'zone' with 'master': Requested
>> resource is busy.
>>
>> Each such error will cause Knot to retry the zone later, and waste time
>> and cycles. Is there any way to get Knot to limit the number of parallel
>> XFRs it does? Or re-use TCP connections?
>>
>> The Knot server has been running for over 15 minutes now, and has still
>> not finished boot-strapping all the zones.
>>
>> Regards,
>>
>> Anand
>> _______________________________________________
>> knot-dns-users mailing list
>> knot-dns-users(a)lists.nic.cz
>> https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-dns-users
Hi Everyone,
with the 1.5.0 mostly feature-complete, us jolly folks at the CZ.NIC Labs
thought
that the time has come to share it with you in form of a first release
candidate.
I'd like to tell you a story first - I was browsing through the NEWS file,
looking back
at the things we've done since the 1.0.0 two years ago. Oddly enough, one
of the new
features was an "optimized memory consumption", and I've seen this repeat a
few times.
I would have thought that the Knot DNS consumes zero memory by now, but it
appears it doesn't
work that way. The law of diminishing return still applies, and the changes
in between the versions
seem almost insignificant. Sometimes at least (recently, I've added a
benchmark of 1M small zones to our benchmark [1], which showed how much
memory did we need per each zone).
We addressed that. And despite the new preallocated packet buffers and
other features, we still managed to cut down the resource requirements for
TLD use cases for about 20%.
My point is, while the 20% does not seem that impressive alone, but the
steep release-over-release tendency of smaller memory footprint and faster
startup/answer performance just shows the unrelenting attention to the
seemingly insignificant stuff, like structure alignment or packet
distribution. That's what we're commited to.
Now, what's actually new in the 1.5.0? I've touted the major changes under
the bonnet earlier this
year and boy, we've been busy. One of the major changes is the new query
processing, which allowed us to do several cool things. The query
processing is broken down to the set of step,
that are built like a LEGO, and each of the steps can be altered by the
modules.
We have two modules now - a module capable of synthesizing forward/reverse
records according to the configuration template. This for example solves
the IPv6 reverse records problem (SLAAC as well), as we don't have to
generate massive zones, but rather create the records on the fly.
The second module is a dnstap query/response log. Heard about the dnstap
[2]? It's a pretty ingenious solution to the fine-grained capture of the
DNS traffic without compromising the performance.
By the way, the utilities (kdig) support it too and you can either capture
or replay queries now.
The good thing about modules is that it allows us to streamline (about 12K
LOC less) the core functionality and extend the server at the some time.
Think RRL, load balancing, geo-aware answers.
What about other things? As for the visible changes, for instance a
multi-master failover, improved logs, asynchronously loaded zones, much
more accurate "knotc memstats" and "zonestatus" tools, new user manual ...
I could probably bore you to death with the nitty gritty stuff, so check
out the changelog to know more. That being said, I'd like to ask your help.
The new stuff, like the asynchronous zone loading or logging, change the
usability a little. Did we break your scripts or use case? Compliment,
cheeky remark or angry rant? Please let us know, we'd like to get most of
the kinks ironed out till the final release. Thank you.
Changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.5.0-rc1/NEWS
<https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS>
Sources:
https://secure.nic.cz/files/knot-dns/knot-
<https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.gz>1.5.0-rc1
<https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS>.tar.gz
https://secure.nic.cz/files/knot-dns/knot-
<https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.xz>1.5.0-rc1
<https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS>.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-
<https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.gz.asc>1.5.0-rc1
<https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS>.tar.gz.asc
https://secure.nic.cz/files/knot-dns/knot-
<https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.xz.asc>1.5.0-rc1
<https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS>.tar.xz.asc
[1] http://knot-dns.labs.nic.cz/pages/benchmark.html#tab-resource-usage
[2] http://dnstap.info/
Kind Regards,
Marek
--
Marek Vavrusa, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Dne St 28. května 2014 16:19:49, knot-dns-users-owner(a)lists.nic.cz napsal(a):
> As list administrator, your authorization is requested for the
> following mailing list posting:
>
> List: knot-dns-users(a)lists.nic.cz
> From: fay-mutluluk-hikayeleri(a)fotoalem.com
> Subject: You are in the financial matrix. Choose the red pill!
> Reason: Post by non-member to a members-only list
>
> At your convenience, visit:
>
> https://lists.nic.cz/cgi-bin/mailman/admindb/knot-dns-users
>
> to approve or deny the request.
Hello List!
Today, we release Knot DNS 1.4.6 with two minor fixes.
First issue we've fixed would only occur when doing DNSSEC key
rollover using the key metadata (via the dnssec-settime tool, for
example) - there was a possibility that the server would try to sign the
zone continuously for a limited amount of time. DNSSEC data would stay
valid all the time though.
The other fix concerns mainly RRL users with recvmmsg enabled - when
using SLIP other than 1, responses that should have been dropped were
actually sent as empty UDP datagrams. Such responses would not be
helpful to the attacker, as they are actually smaller than the queries,
but they could confuse legitimate clients. This applies for the
responses to malformed query messages as well, even if the RRL is
disabled.
All in all, if you do not use the automatic DNSSEC or RRL, there's
probably no need to update. Hopefully, this is the last release before
the 1.5RC1 comes out, so stay tuned.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.6/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.4.6.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.4.6.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.4.6.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.4.6.tar.xz.asc
Updated packages will be available shortly. Thank you for using Knot
DNS.
Regards,
Jan
--
Jan Kadlec, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hi there,
do you plan to enable/run Knot as a recursive server too ? We used our
master dns server as a recursive server too (only for our servers), but
after migrating from Bind to Knot it is not possible. For now I had to
change asking secondary dns server with bind, but ... :)
Thanks and best regards
J.Karliak.
Hi,
I've some problems with my domains, I was unreacheable because of knot
wasn't responding. I want to run debug, I've this in my knot.conf:
...
...
log {
syslog { any all; zone all; }
file "/var/log/knotd.debug" {
server debug;
zone debug;
}
...
...
but the "/var/log/knotd.debug" file is empty. Did I missed something ? :)
About knot : he was running, SOA querried to master server that my knot
makes slave, but didn't answered for my domains that he manage. After
restart knot all's fine... Anyway I made a few minutes ago update of the
knot, maybe some "old" bug fixed in the new version, now running
"knot-1.4.4-49.1.x86_64".
Thanks and best regards
J.Karliak.
Hi!
I use knot 1.4.4 and sign my zones with NSEC3.
Is NSEC3 with opt-out supported?
If yes, how can I activate opt-out?
I tried setting the flag in the NSEC3PARAM record but apparently this
does not activate opt-out.
Thanks
Klaus
Hi Everyone,
we're getting closer to the 1.5 release and because we're mostly
feature complete now, I think today might be a good opportunity to
share some of the new stuff we've created and hear out your opinions.
There's a ton of improvements that I can't cover in a few paragraphs,
but I've picked 3 of those that I think are the pillars for the bigger
plan for this year.
Just so you know, there is no tarball this time, but if you're brave
enough, you can actually try everything covered here. You can find the
code in our git repository under a tag "v1.5.0-alpha":
$ git clone -b v1.5.0-alpha https://gitlab.labs.nic.cz/labs/knot.git
1. Query processing and code base
We've known for a while that there were parts of the code that we
weren't happy with. It's not just that it was getting hard to patch
and read, but with we had a ton of ideas that we couldn't get
implemented because of the limitations (in fact, this effort bears
fruits as soon as of this release, but more on that later). One of
those places was query processing and dealing with queries in general.
Naturally, we've sat down and reworked this from scratch. Now, from
the user perspective it's not so exciting - yes we made it RFC
compliant in several cases and it's faster than ever (I'm running
benchmarks as we speak, so you might want to check out our webpage
later). It's still a preview and we're ironing things out, so don't
take the numbers as final.
For those who are interested in the details (thank you!), it's much
much more important because the code lays a solid foundation for the
cool stuff to come while being lightweight. How much? Around 10+k LOC
which is roughly 10-15% of our code base gone and we offset that by
adding almost 5k LOC worth of test cases. To put it in another words,
it means it does more with less and we're not done here.
2. Separating Knot DNS library
We also improved the Knot DNS build process overall. The code
providing basic building blocks for the server and utilities is now
held in the libknot library, which is by default linked dynamically to
these components. You will also notice the libzscanner library, our
high-performance zone scanner written in Ragel (with no dependencies
on Knot DNS). We plan to build some other projects on top of that and
provide public headers in the future (which is more likely to happen
for the libzscanner - if someone is interested). But currently, you
may benefit from a smaller size of the binaries.
3. Pluggable query processing modules + auto forward/reverse records
New features are always a compromise - usually between ease of use,
complexity and resource usage.
But what if we could make the core as lightweight as possible and let
the user choose? The new processing API is built like a Lego (don't
step on it though), it breaks down the processing into independent
parts that together form a plan for query processing. So what we did
was, we've created an interface for loadable modules and let it
add/remove or change the query processing plan as the module sees fit.
This allows to keep complexity at bay (for those who don't want extra
stuff) and provide a playground for new ideas. We actually have a
first module - it can synthesize per-answer forward/reverse records
for IPv4/IPv6 addresses from a template in configuration file (see
4.11 in the documentation on further information). For the impatient,
an example speaks the best:
We have an IPv6 reverse zone we need to take care of, but the problem
is the address space is too big to generate a zone file. So we create
an empty zone, put in static records we want and let the module to
synthesize other records per-answer (if they fit in the template and
aren't present in the zone):
# Configuration:
1.6.b.0.0.0.0.0.0.2.6.2.ip6.arpa {
query_module {
synth_record "reverse dynamic- example. 400 2620:0:b61::/52";
}
Now if we load Knot DNS, and kdig for a reverse record, we get a
following reply:
$ kdig PTR 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.6.b.0.0.0.0.0.0.2.6.2.ip6.arpa.
;; QUESTION SECTION:
;; 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.6.b.0.0.0.0.0.0.2.6.2.ip6.arpa.
0 IN PTR
;; ANSWER SECTION:
..snip.. 400 IN PTR dynamic-2620-0000-0b61-0000-0000-0000-0000-0001.example.
Forward records can be dealt with in a similar fashion, see the manual
4.11 for more examples and information.
To sum it up, modules could be a way to accommodate for the "should
this be a in a nameserver?" sort of things. If you don't like it, just
don't put it in the configuration and you're good. As of now the
module API is open (no "how to" though), and so are we for ideas.
Phew, this was longer than I expected and I barely scratched the surface.
As you see, this version is going to be a lot about tidying up and
opening up the possibilities.
So what's your take on this?
Best,
Marek
--
Marek Vavrusa, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hi Everyone,
while we in the CZ.NIC Labs are all focused on the next big thing, I
thought now it might be a good time to get out another of our
(admittedly highly irregular) monthly patch releases. Bug fixes aside,
there are a couple improvements that we hope will make your life
easier. Here's the breakdown:
- 'knotc reload' does not immediately refresh/notify unchanged zones.
This fixes the flurry of refresh messages after each reload and makes
it lightweight enough to be used frequently. Note that new/changed
zones are still added and old zones are removed. However, if you want
to refresh zones explicitly, you need to call 'knotc refresh' after
reload now.
- 'knotc -f refresh' now truly forces a zone refresh. To put it in
another words, it's akin to the 'retransfer' command that you missed
in the Knot DNS and instead of checking for new zone, it starts a full
transfer of the zone right away.
- 'knotc' remote commands are now logged in the daemon logfile
Now, there are several bugfixes as well. See the NEWS for a complete
list, but here's a selection of the most notable - in several cases
notify messages weren't sent after a zone resign, progressive
bootstrap retry regression was fixed, few issues with journal and
maximum entry size. There is also a slight behaviour change in the
zone file parser and the daemon itself. First - zone file parser now
accepts asterisk in the domain name labels (wildcards aside). As for
the daemon, if a zone is in a slave mode and fails to load for some
reason, it immediately tries to reboostrap from the master server
instead of just reporting an error.
I'd also like to thank to Robert S. Edmonds for amending various
spelling errors and typos in manpages and documentation, thanks!
So that's it, I hope the improvements make this update a little
worthwhile before new stuff
comes out later this spring.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.4/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.4.4.tar.xz.asc
Kind Regards,
Marek
--
Marek Vavrusa, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hi there,
I migrated our primary DNS from Bind to Knot. I runned some tests by
nic.cz's dnscheck, but there is an error:
DNSSEC signature RRSIG(fnhk.cz/IN/SOA/64431) fails to validate the RR set:
key 1: keytag does not match key 2:RSA Verification failed
Link to test:
http://dnscheck.labs.nic.cz/?time=1395821962&id=102810&view=advanced&test=s…
Knot doesn't complains to anything in the system log, fnhk.cz zone is
succefully signed.
What did I missed ?
Thanks and best regards
J.Karliak.
Hello,
What do you guys recommend to audit every resource
record in a zone file against all the records in all the DNS.
I want something that I feed the master zone file and then goes to each
NS server and ensures that the records are correct in all of them.
For some strange reason all my DNS servers have the same SOA Serial, but
after deleting two MX records, some 4 out of 5 the DNS servers have not
taken this update. I've yet to figure out the cause, but I see that SOA
Serial is not to be trusted.
Regards,
Maren.
On 2/24/2014 7:00 PM, knot-dns-users-request(a)lists.nic.cz wrote:
> Date: Mon, 24 Feb 2014 09:16:27 +0100
> From: Jan Kadlec <jan.kadlec(a)nic.cz>
> To: "Maren S. Leizaola" <leizaola(a)hk.com>
> Cc: knot-dns-users(a)lists.nic.cz
> Subject: Re: [knot-dns-users] GLUE and additional records.
> Message-ID:
> <1393229787.1717.12.camel(a)labs.jan.kadlec.ws.eth.1.office.nic.cz>
> Content-Type: text/plain; charset="UTF-8"
>
> Hello Maren and thanks for your report. Knot normally sends glue records
> in additional section, it seems as if you might have encountered a bug.
> Could you provide more data? One NS, A (AAAA) combination and a dig
> output for this combination should be enough. Thanks again, Jan.
>
The environment is as follows. I host hk.com on 6 DNS servers, right now
5 are bind and one is Knot. hk.com's name servers are
a,b,c,d,e,f.udrtld.net b is running Knot.
Try this link www.intodns.com/hk.com
This reports that B provides no glue. Please ignore the errors on f.
i've yet not setup urdtld.net on it.
dig -cA hk.com @b.udrtld.net
when I do a
dig -cA hk.com @a.udrtld.net
Am I making any mistakes here?
Maren.
Hello,
I am currently testing Knot on our zones and find that it
does not give any of the additional records which contain the IP of the
names servers ie knot servers donot provide Glue records. This is one
good thing that Bind does at it reduces the number of queries a resolver
has to make.
Is there any way for us to be able to do this.
Regards,
Maren.
Hi Everyone,
I think the time is ripe for a small status update, preview of things
to come and a new patch release. Sounds good? So, at the moment, our
team at the CZ.NIC Labs is working towards the next major thing, but
I'd like to reiterate that we didn't forget about the 1.4 and as of
today we have a new release with several important backported
bugfixes, here's the brief version:
* Two bugs related to authenticated denial of existence proof with a
certain combination of wildcard expansions triggering an assertion
failure
* Comparison of $ORIGIN and zone file in configuration is case insensitive
* Corrupted journal data caused a cleanup failure during the zone loading
In addition to the bugfixes, we have also slipped in a small
enhancement - "include" statement in the configuration can include
whole directory, this is useful if you have really a lot of includes
in one place.
Now a brief status update on what are we working on and what can you
expect in the next few weeks/months. The next major release is going
to happen later this spring and it's going to be focused on three
things mostly - covering the code by tests, cleaning up and polishing
existing features. There's going to be a feature or two, but that is
not the main focus. The reason is the functionality we have piled up
over the time has taken it's toll and now is the right time to sit
back and make the features leaner and meaner (that includes usability
as well), as that was always an integral idea behind Knot DNS. Plus
less things means less things to break, right?
I'd like to thank namely Petr Stastny and Olafur Gudmundsson (among
others) for bugreports, ideas and thoughts.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.3/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.4.3.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.4.3.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.4.3.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.4.3.tar.xz.asc
Kind Regards,
Marek
--
Marek Vavrusa, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hi Knot developers,
I have a feature request: I'd like a knotc command that will force Knot
to transfer a zone that is configured as a slave. The only command I can
issue at the moment is "refresh", but this will not transfer a zone if
Knot has a higher serial than the master.
Such a forced transfer command is useful to help recover from situations
where due to some operational error on the master server, the serial
number has gone back, and we deliberately need our Knot server to sync
to that old serial number. Without this command, the only way to make
Knot recover is to stop it, delete the zone file from disk and start it
again. But this is not ideal on a running server with lots of zones,
because the stop and start times can be quite high (in our case, 37s to
stop, and 1m30s to start).
Both BIND and NSD provide such commands to ignore the serial number
check and force zone transfers. I'd love to see such a command for Knot too.
Regards,
Anand
I started to play with the dnssec signing features in Knot.
I had this in my .conf file
B-100.tld { file "B-100.zone"; …. }
In the B-100.zone file I had
$ORIGIN B-100.tld.
I get
Jan 31 16:27:32 bigredone knot[31315]: [error] Zone 'B-100.tld.': mismatching origin in the zone file.
Jan 31 16:27:32 bigredone knot[31315]: [error] Failed to load zone 'B-100.tld.'.
When I changed to
$ORIGIN b-100.tld.
Same error
When I changed the conf line for B-100 to b-100
zone got loaded,
I when I changed Origin to upper case but kept the lower case in conf file then zone was loaded.
Summary: conf file requires zone name to be lower case, origin can be either case.
(not documented)
I do not think this what users expect.
Either respect the case that users present or downcase both zone name and name on $ORIGIN line
Also I would be great to have knot-checkzone command that one can use to verify the syntax of zone
with output to standard output.
Olafur
Hello,
I'm using Knot DNSSEC automatic signing and all is well and working.
How would one go about obtaining proper DS records for registrar glue
with least amount of trouble?
Thanks for Knot DNS, by far the most pleasant experience in comparison
with all other DNS servers. I've had zero issues with it, flawless
operation from the start!
Hello List!
We really appreciate your feedback on the previous release - both positive and
negative. Thank you for that, it motivates us to make Knot DNS even better.
Today, CZ.NIC Labs proudly announce the Knot DNS 1.4.2.
There are quite a lot of changes:
* The new release includes a compatibility fix for the AXFR/IXFR issues, which
occurred when accepting transfers from tinydns/axfrdns.
* In some cases, a TSIG did not fit into the outgoing transfer causing the
transfer to be terminated. This problem was addressed as well.
* Also, journal files are newly created only when necessary. It means
that some disk space is spared when IXFR, DDNS, and DNSSEC signing are
disabled. Feel free to delete the existing journal files if the zones fits
into this category.
* In addition, problems with incorrect logging categories regarding zones were
reported. The logging was reviewed and should be appropriate with the new
release.
* We also fixed several problems in DNSSEC. Firstly, the 'knotc signzone'
command was broken and caused a deadlock of the main server thread. It does
not happen with the new version.
Secondly, prior to this release, the signatures were refreshed two hours
before their expiration, which was found to be extremely insufficient. With
the new release, signatures are refreshed one tenth of the signature
lifetime before their expiration. With the default configuration, the
signature lifetime is 30 days, which implies that the signatures are
refreshed three days before the expiration.
* Moreover, RRSIGs in the additional records not-fitting into the DNS message
do not cause packet truncation, but are simply skipped.
We are looking forward to your reactions and comments.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/blob/v1.4.2/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-1.4.2.tar.gzhttps://secure.nic.cz/files/knot-dns/knot-1.4.2.tar.xz
GPG signatures:
https://secure.nic.cz/files/knot-dns/knot-1.4.2.tar.gz.aschttps://secure.nic.cz/files/knot-dns/knot-1.4.2.tar.xz.asc
Best Regards,
Jan
--
Jan Včelák, Knot DNS
CZ.NIC Labs http://www.knot-dns.cz
-------------------------------------------
Americká 23, 120 00 Praha 2, Czech Republic
WWW: http://labs.nic.czhttp://www.nic.cz
Hello.
I configured "max-udp-payload 1464" and noticed that Knot 1.4 sets tc if
it can't fit RRSIGs for records in the additional section while 1.3.4
didn't.
I was wondering what the reasoning is behind this behaviour. Shouldn't
validating resolvers ignore unsigned record sets in the additional
section anyway?
In my tests, Knot 1.4 almost always sets tc unless it can fit all
DNSKEYs, nameserver addresses and their signatures in the additional
section. That seems a bit excessive. There are only a few narrow buffer
sizes ranges that don't result in a truncated response, depending on the
reply content:
> $ l=""; i=1800; j=$i; while [ "$i" -lt "4097" ]; do n="`dig +bufsize=$i +ignore +norec +dnssec openchaos.org soa @nsig17.openchaos.org |grep ";; flags:"`"; [ "$l" != "$n" ] && { echo "$j - $(($i-1)): $l"; l=$n; j=$i; }; i=$(($i+1)); done; echo "$j - $(($i-1)): $n"
> 1883 - 1898: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 4
> 2102 - 2129: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 6
> 2333 - 2348: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 8
> 2552 - 2567: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 10
> 2771 - 2798: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 12
> 3002 - 3017: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 14
> 3221 - 3236: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 16
> 3440 - 3455: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 18
> 3659 - 3686: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 20
> 3890 - 4096: ;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 7, ADDITIONAL: 22
FWIW, the attached patch works for me. It should remove the last
additional record if its RRSIG doesn't fit.
Hauke
Hi,
the majority of warning messages does not contain particular domain name
(zone name), so it is impossible to figure which zone file is wrong.
For example:
> 2014-01-23T20:13:07 [warning] encountered identical extra SOA record
> 2014-01-23T20:13:07 [warning] encountered identical extra SOA record
> 2014-01-23T20:13:07 [warning] TTL does not match TTL of its
> RRSet.Changing to 19200
Can you please add zone names into all error and warning messages
related to one zone?
Thanks
Petr Šťastný
Hello,
I want to use Knot for master zones only without any DNS updates, so
journal files are not needed. But they are created for every zone and it
seems impossible to disable them.
But this is bad in my situation when I want to serve 200000+ zones,
because it creates 200000+ journal files in one directory (but they are
never used).
Should be possible to disable journal files or create them only in case
of need or at lease divide them into more subdirectories?
It would be also nice to be able to choose another directory for journal
files in configuration. "storage" option is for both (zone files and
journal files). Or explicitly state journal file path and filename in
"zone" section.
Thanks
Petr Šťastný
Hoj vespolek.
trosku jsem se uz ztratil s dnssecem s knotem. Vygeneroval jsem si
klice, rekl knotu, kde ma klice hledat, knot je podepsal, zadna
stiznost od nej. Klic jsem zadal i do keysetu na web4u, to proslo
taky. Ale pokud si udelam drill my zony, drill oznami, ze mi chybi DS
zaznam nebo trusted key:
drill -TD ajetaci.cz
Warning: No trusted keys were given. Will not be able to verify authenticity!
;; Domain: .
;; Signature ok but no chain to a trusted key or ds record
[S] . 172800 IN DNSKEY 256 3 8 ;{id = 33655 (zsk), size = 1024b}
. 172800 IN DNSKEY 257 3 8 ;{id = 19036 (ksk), size = 2048b}
Checking if signing key is trusted:
New key: . 172800 IN DNSKEY 256 3 8
AwEAAb8sU6pbYMWRbkRnEuEZw9NSir707TkOcF+UL1XiK4NDJOvXRyX195Am5dQ7bRnnuySZ3daf37vvjUUhuIWUAQ4stht8nJfYxVQXDYjSpGH5I6Hf/0CZEoNP6cNvrQ7AFmKkmv00xWExKQjbvnRPI4bqpMwtHVzn6WybBZ6kuqED ;{id = 33655 (zsk), size =
1024b}
[S] cz. 86400 IN DS 54576 10 2
397e50c85ede9cde33f363a9e66fd1b216d788f8dd438a57a423a386869c8f06
;; Domain: cz.
;; Signature ok but no chain to a trusted key or ds record
[S] cz. 18000 IN DNSKEY 256 3 10 ;{id = 40877 (zsk), size = 1024b}
cz. 18000 IN DNSKEY 257 3 10 ;{id = 54576 (ksk), size = 2048b}
cz. 18000 IN DNSKEY 256 3 10 ;{id = 54602 (zsk), size = 1024b}
[S] Existence denied: ajetaci.cz. DS
;; No ds record for delegation
;; Domain: ajetaci.cz.
;; Signature ok but no chain to a trusted key or ds record
[S] ajetaci.cz. 3600 IN DNSKEY 257 3 5 ;{id = 36256 (ksk), size = 2048b}
ajetaci.cz. 3600 IN DNSKEY 256 3 5 ;{id = 11937 (zsk), size = 1024b}
[S] ajetaci.cz. 3600 IN A 77.48.63.10
;;[S] self sig OK; [B] bogus; [T] trusted
--
Ma domena pouziva zabezpeceni a kontrolu SPF (www.openspf.org) a
DomainKeys/DKIM (with ADSP) . Pokud mate problemy s dorucenim emailu,
zacnete pouzivat metody overeni puvody emailu zminene vyse. Dekuji.
My domain use SPF (www.openspf.org) and DomainKeys/DKIM (with ADSP)
policy and check. If you've problem with sending emails to me, start
using email origin methods mentioned above. Thank you.
----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.
Hi,
I think there is something wrong with logging categories.
Documentation says:
> server - Messages related to general operation of the server.
> zone - Messages related to zones, zone parsing and loading.
I use Knot 1.4.1 with the following configuration:
> log {
> file "/var/log/knot/knot-server.log" {
> server error, warning, notice, info;
> }
>
> file "/var/log/knot/knot-zone.log" {
> zone error, warning, notice, info;
> }
>
> stderr {
> any error, warning;
> }
> }
Everything is logged only into knot-server.log and knot-zone.log is
always empty.
knot-server.log file contains:
> 2014-01-20T21:45:12 Knot DNS 1.4.1 starting.
> 2014-01-20T21:45:12 Rate limiting set to 20 responses/sec.
> 2014-01-20T21:45:12 Binding to interface 0.0.0.0 port 53.
> 2014-01-20T21:45:12 Binding to interface :: port 53.
> 2014-01-20T21:45:12 Configured 2 interfaces and 1 zones.
> 2014-01-20T21:45:12 Changing group id to '1001'.
> 2014-01-20T21:45:12 Changing user id to '1001'.
> 2014-01-20T21:45:12 Server started as a daemon, PID = 25371
> 2014-01-20T21:45:12 PID stored in
> '/usr/local/knot/1.4.1/var/run/knot/knot.pid'
> 2014-01-20T21:45:12 Server changed directory to /.
> 2014-01-20T21:45:12 Zone 'xxxx.eu.' loaded (serial 2013042301)
> 2014-01-20T21:45:12 Loaded 1 out of 1 zones.
> 2014-01-20T21:45:12 Starting server...
> 2014-01-20T21:45:12 Binding remote control interface to
> /usr/local/knot/1.4.1/var/run/knot/knot.sock
> 2014-01-20T21:45:25 Reloading configuration...
> 2014-01-20T21:45:25 Zone 'xxx.eu.' is up-to-date (serial 2013042301)
> 2014-01-20T21:45:25 Loaded 1 out of 1 zones.
> 2014-01-20T21:45:25 Configuration reloaded.
And the question is: why are messages related to zone loading logged in
"server" category and not in "zone" category (which is said in
documentation)?
Thanks
Petr Šťastný
Hi Anand,
Never mind. I understand your situation.
Initially, we had just timestamps in zone dumps. I prefer this, since
it makes smaller dumps and it is faster to process such records.
Afterwards,
we turned it off due to incompatibility with Bind. Because Bind is
unable
to load these dumps if you need it.
Is there still anybody who requires human-readable timestamps in zone
dumps from Knot?
If not, we probably disable this functionality.
Thanks,
Dan
On 2014-01-10 23:08, Anand Buddhdev wrote:
> On 10/01/2014 19:42, daniel.salzman(a)nic.cz wrote:
>
>> We have probably found the problem. The function gmtime, which we use,
>> is not thread safe. So I have replaced it with a better one. Please,
>> try the attached patch.
>
> Hi Daniel,
>
> Thanks for this. However, I prefer not to test this on our current Knot
> servers, as they are running in production. I have applied Marek's
> earlier patch which disabled human-readable timestamps, and that's
> keeping this problem away.
>
> Actually, I even asked Marek why you convert the timestamps to
> human-readable in the zone dumps. After all, the zone files are only
> going to be read back in by Knot, so you'd save some cycles when
> writing
> and reading the zones, by not converting them back and forth between
> human-readable and unix timestamp.
>
> Is it reasonable to ask that you just dispense with human-readable
> timestamps?
>
> Regards,
>
> Anand