Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Acme DNS-NSupdate / RFC 2136 issue

    Scheduled Pinned Locked Moved ACME
    53 Posts 5 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @VioletDragon
      last edited by Gertjan

      @VioletDragon

      My logs are somewhat different :
      First : as I ask for a wild card certificate, so two TXT records to add :

      07-Aug-2024 07:53:10.411 update-security: client @0x7ff5325d5070 82.127.xx.108#55966/key update: signer "update" approved
      07-Aug-2024 07:53:10.411 update: client @0x7ff5325d5070 82.127.xx.108#55966/key update: updating zone 'domain.tld/IN': adding an RR at '_acme-challenge.domain.tld' TXT "JLJQnIUFDoiQKHfN6iyFvHIuMMhF_-h7I5-mWcaZGX4"
      07-Aug-2024 07:53:10.719 update-security: client @0x7ff5325d5070 82.127.xx.108#65112/key update: signer "update" approved
      07-Aug-2024 07:53:10.719 update: client @0x7ff5325d5070 82.127.xx.108#65112/key update: updating zone 'domain.tld/IN': adding an RR at '_acme-challenge.domain.tld' TXT "Rmcf8iJ7-R7joIpa_hEMgfYBm9jpt_YuSP3eyBjSfq4"
      

      Then, a dnssleep of 3 minutes.
      During this time LE checks the "_acme-challenge.domain.tld' TXT" on the master, or one of my DNS slaves, or all of them ?

      When done, it's clean up time:

      07-Aug-2024 07:55:17.432 update-security: client @0x7ff5325d5070 82.127.xx.108#57576/key update: signer "update" approved
      07-Aug-2024 07:55:17.432 update: client @0x7ff5325d5070 82.127.xx.108#57576/key update: updating zone 'domain.tld/IN': deleting rrset at '_acme-challenge.domain.tld' TXT
      07-Aug-2024 07:55:17.596 update-security: client @0x7ff528513520 82.127.xx.108#55196/key update: signer "update" approved
      07-Aug-2024 07:55:17.596 update: client @0x7ff528513520 82.127.xx.108#55196/key update: updating zone 'domain.tld/IN': deleting rrset at '_acme-challenge.domain.tld' TXT
      

      where 82.127.xx.108 is my pfSense WAN IP, from where the acme.sh pfSEnse package runs.

      Also : in "named.conf.options" I have this animal :

      logging {
      	 category "lame-servers" { lame; };
      	
      	 channel "lame" {
      		file "/var/log/bind9/lame.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity dynamic;
      	};
      
      	category "default" { "debug"; };
      	category "database" { "debug"; };
      	category "security" { "debug"; };
      	category "config" { "debug"; };
      	category "resolver" { "debug"; };
      	category "client" { "debug"; };
      	category "unmatched" { "debug"; };
      	category "network" { "debug"; };
      	category "update" { "debug"; };
      	category "dispatch" { "debug"; };
      
      	channel "debug" {
      		file "/var/log/bind9/debug.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity dynamic;
      	};
      
      	category "dnssec" { "dnssec"; };
      	channel "dnssec" {
      		file "/var/log/bind9/dnssec.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity dynamic;
      	};
      
      	channel "xfer" {
      		file "/var/log/bind9/xfer.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity debug;
      	};
      	category "xfer-in" { "xfer"; };
      	category "xfer-out" { "xfer"; };
      	category "notify" { "xfer"; };
      
      	channel "general" {
      		file "/var/log/bind9/general.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity dynamic;
      	};
      	category "general" { "general"; };
      		
      	channel "b_query" {
      		file "/var/log/bind9/query.log" versions 10 size 5m;
      		print-time yes;
      		print-category yes;
      		severity dynamic;
      	};
      	category "queries" { "b_query"; };
      };
      

      which throws all the update (RFC1236 ?) stuff into the debug log

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      VioletDragonV 1 Reply Last reply Reply Quote 0
      • VioletDragonV
        VioletDragon @Gertjan
        last edited by

        @Gertjan Can you post the Zones you use ?

        I don't believe the latest version of BIND i am running is using these Keys that is the issue here because Acme on pfSense keeps complaing about dns_request_getresponse: expected a TSIG or SIG(0), even though I have specified the key it doesn't seem to be in use.

        Regards

        GertjanG 1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @VioletDragon
          last edited by Gertjan

          @VioletDragon

          root@ns311465:~# named -v
          BIND 9.16.50-Debian (Extended Support Version) <id:acf2ba4>
          root@ns311465:~# cat /etc/debian_version
          11.11
          

          Debian 11.11 isn't the latest, I have to jump to 12.x soon.

          My zone info : see above.


          @VioletDragon said in Acme DNS-NSupdate / RFC 2136 issue:

          ven though I have specified the key it doesn't seem to be in use.

          My zone mentions:

          zone "bhf.tld" {
          type master;
          file "/etc/bind/zones/db.bhf.tld";
          allow-transfer { "ns-internal-net"; };
          masterfile-format text;
          notify-source a.b.c.d;
          notify explicit;
          allow-update { key "update";};
          };

          and also, atbtyhe top of the file :

          // For /root/.acme.sh/acme.sh - the "update" key
          include "/etc/bind/le-acme-keys/le-acme.key";
          

          and this file "le-acme.key" contains :

          key "update" {
              algorithm hmac-sha512;
              secret "eYQiVAutExxxxxxxxxx/
              xxxxxxxxxxxxxxxxxxxCaJwzkuZp0w==";
          };
          

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          VioletDragonV 1 Reply Last reply Reply Quote 0
          • VioletDragonV
            VioletDragon @Gertjan
            last edited by

            @Gertjan Yours is a older version, mines running BIND 9.18.28-0ubuntu0.22.04.1-Ubuntu (Extended Support Version)

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @VioletDragon
              last edited by

              @VioletDragon

              Ubuntu ? What is that ? 😊

              But ok, I take note : when I upgrade to Debian 12, which contains bind 9.18.x, and I do work out the tedious "what will be better, and what will utterly break" list, I'll keep an eye on RFC 2136 support.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              VioletDragonV 1 Reply Last reply Reply Quote 0
              • VioletDragonV
                VioletDragon @Gertjan
                last edited by

                @Gertjan everything i try and do doesn't work, its either a problem with Acme or BIND9 itself. Strange how Certbot works though.

                VioletDragonV GertjanG 2 Replies Last reply Reply Quote 0
                • VioletDragonV
                  VioletDragon @VioletDragon
                  last edited by

                  I generally think Acme Package on pfSense is broken.

                  1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @VioletDragon
                    last edited by

                    @VioletDragon

                    I use the acme.sh nsupdate method to do some RFC2136 manually.

                    I've created a file called /root/server

                    server 1.2.3.4 53
                    update add blabla.bhf.tld. 60 in txt "yahoo"
                    send
                    

                    Where 1.2.3.4 is your master name server.
                    Be careful of "blabla.bhf.tld." should be your domain name and has an ending dot .

                    Now, for some action :
                    Have a look at your /tmp/acme/ folder - it should contain a folder that represent your domain.
                    In that folder, you will find a file that ends with .net.key.
                    Look at what in it :
                    Surprise :

                    key "update." {
                    	algorithm HMAC-SHA512;
                    	secret "eYQiVAutEExxxxxxxxx/
                            xxxxxxxxxxxxxxxxxxxxhO9zDCaJwzkuZp0w==";
                    };
                    

                    ( you wonder where did came from ^^)

                    Show time :

                    Type

                    nsupdate -d -k / /tmp/acme/DOMAIN/DOMAINnsupdate_acme-challenge.DOMAIN.net.key server
                    

                    I saw :

                    Creating key...
                    Creating key...
                    namefromtext
                    keycreate
                    Reply from SOA query:
                    ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id:  22473
                    ;; flags: qr aa; QUESTION: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
                    ;; QUESTION SECTION:
                    ;blabla.bhf.tld.   IN      SOA
                    
                    ;; AUTHORITY SECTION:
                    bhf.tld.   0       IN      SOA     ns1.bhf.tld. postmaster.bhf.tld. 2023020845 14400 3600 1209600 10800
                    
                    ;; TSIG PSEUDOSECTION:
                    update.                 0       ANY     TSIG    hmac-sha512. 1725292457 300 64 WcOM9s/w29Hken6Bmzg3exxxxxxxxxeaz3+1SheVSw46NJ7E1isSEg== 22473 NOERROR 0
                    
                    Found zone name: bhf.tld
                    The primary is: ns1.bhf.tld
                    Sending update to 5.196.xx.182#53
                    Outgoing update query:
                    ;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id:  54168
                    ;; flags:; ZONE: 1, PREREQ: 0, UPDATE: 1, ADDITIONAL: 1
                    ;; UPDATE SECTION:
                    blabla.bhf.tld. 60 IN      TXT     "yahoo"
                    
                    ;; TSIG PSEUDOSECTION:
                    update.                 0       ANY     TSIG    hmac-sha512. 1725292457 300 64 tHWwUToJ6uM4S4OrbNxxxxxx72YPC54EKG0UKSYFwuIg== 54168 NOERROR 0
                    
                    
                    Reply from update query:
                    ;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id:  54168
                    ;; flags: qr; ZONE: 1, PREREQ: 0, UPDATE: 0, ADDITIONAL: 1
                    ;; ZONE SECTION:
                    ;bhf.tld.          IN      SOA
                    
                    ;; TSIG PSEUDOSECTION:
                    update.                 0       ANY     TSIG    hmac-sha512. 1725292457 300 64 XAyLf3RacccccccccccccccccccccccccccceCunW95a2Dl1oQD+jql0g== 54168 NOERROR 0
                    

                    So, you also, should be able to do RFC 2136 'by hand'.
                    As RFC 2136 can't be broken of course.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    VioletDragonV 4 Replies Last reply Reply Quote 0
                    • VioletDragonV
                      VioletDragon @Gertjan
                      last edited by

                      @Gertjan The file you mention with .net.key doesn't exist.

                      1 Reply Last reply Reply Quote 0
                      • VioletDragonV
                        VioletDragon @Gertjan
                        last edited by

                        @Gertjan nsupdate -d -k works on my workstation to the Name Server but Acme doesn't work, certbot work.

                        I think this package is broken personally.

                        LarryFahnoeL 1 Reply Last reply Reply Quote 0
                        • VioletDragonV
                          VioletDragon @Gertjan
                          last edited by

                          @Gertjan Just an update, the config I have the HMAC key isn't work at all, running nsupdate -k allows me to send the change but HMAC key isn't even working not sure what is wrong though

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • VioletDragonV
                            VioletDragon @Gertjan
                            last edited by VioletDragon

                            @Gertjan Give up with this, It's either ACME that has the issue or it's just BIND that's the issue,

                            All I get now is

                            TSIG error with server: tsig verify failure
                            update failed: NOTIMP
                            

                            Did a fresh install with Debian, when running nsupdate -k on the physical name server I get the same error,

                            dns_request_getresponse: expected a TSIG or SIG(0)
                            
                            
                            1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan @VioletDragon
                              last edited by

                              @VioletDragon said in Acme DNS-NSupdate / RFC 2136 issue:

                              HMAC key

                              HMAC**-SHA512**, right ?

                              The nsupdate tool that acme.sh uses isn't from acme.sh, but from the OS ( ? ).

                              The acme.sh update method called "DNS-NSupdate" uses the nsupdate binary, that should be able to talk to bind, on the other side.

                              @VioletDragon said in Acme DNS-NSupdate / RFC 2136 issue:

                              Did a fresh install with Debian, when running nsupdate -k on the physical name server I get the same error,

                              You mean you couldn't even run nsupdate on the debian server itself ?
                              The nsupdate tools that comes with the bind package can't 'talk' to bind ?

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              VioletDragonV 3 Replies Last reply Reply Quote 0
                              • VioletDragonV
                                VioletDragon @Gertjan
                                last edited by

                                @Gertjan update. The configuration for Acme and Certbot is different. Will report back when I’ve done the configuration.

                                1 Reply Last reply Reply Quote 0
                                • VioletDragonV
                                  VioletDragon @Gertjan
                                  last edited by

                                  @Gertjan I've made progress nsupdate now works but the problem I keep getting is on pfSense side,

                                  ; TSIG error with server: tsig verify failure
                                  update failed: NOTIMP
                                  
                                  1 Reply Last reply Reply Quote 0
                                  • VioletDragonV
                                    VioletDragon @Gertjan
                                    last edited by

                                    @Gertjan It seems that acme on pfSense has a problem, tested acme.sh on a Debian VM and it works, not sure what the deal is with acme on pfSense though very strange.

                                    Regards

                                    GertjanG 1 Reply Last reply Reply Quote 0
                                    • GertjanG
                                      Gertjan @VioletDragon
                                      last edited by

                                      @VioletDragon

                                      There is something that you can test :

                                      7c5d0f7f-6716-4925-aa62-56336e7276e9-image.png

                                      as it uses the same 'nsupdate' thus exactly the same parameters :

                                      44dcae30-c1f5-4212-aca5-dfd04e174fd8-image.png

                                      No "help me" PM's please. Use the forum, the community will thank you.
                                      Edit : and where are the logs ??

                                      VioletDragonV 1 Reply Last reply Reply Quote 1
                                      • VioletDragonV
                                        VioletDragon @Gertjan
                                        last edited by

                                        @Gertjan how would that work for Acme SSL Certs ?

                                        GertjanG 1 Reply Last reply Reply Quote 0
                                        • GertjanG
                                          Gertjan @VioletDragon
                                          last edited by Gertjan

                                          @VioletDragon

                                          Not at all.
                                          Services > Dynamic DNS > RFC 2136 Clients uses exacly the same DNS server zone update mechanism by using the 'nsupdate' executable.
                                          Exactly like acme.sh, with the DNS dns_nsupdate method.
                                          acme.sh adds TXT records.
                                          "Services > Dynamic DNS > RFC 2136 Clients" adds A and AAAA records.
                                          Both use the same nsupdate executable on pfSense.
                                          Both use the same key, key name, algorithm, server IP (your domain name master DNS server.

                                          No "help me" PM's please. Use the forum, the community will thank you.
                                          Edit : and where are the logs ??

                                          VioletDragonV 2 Replies Last reply Reply Quote 1
                                          • VioletDragonV
                                            VioletDragon @Gertjan
                                            last edited by

                                            @Gertjan okay sweet I will try that later after doing some work and I will report back.

                                            Do you think that this problem I’m facing is caused by the acme package ? As acme.sh works on Debian, same with Certbot. When running nsupdate that works too just acme package is causing me some problems.

                                            Regards

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.