Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DNSSEC on pfSense

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    178 Posts 18 Posters 71.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      ToxIcon
      last edited by

      @jlepthien:

      @ToxIcon:

      Thanks jlepthien :)

      So that was the problem? You could have easily found out by looking at the logs ;-)

      yes that was the problem

      I know I know that is what I get for rushing and the bad part is that I have a sticky posted on the box
      to always check the logs when trying to fix connection error.

      Unbound taste great less filling  works great :=)

      1 Reply Last reply Reply Quote 0
      • M
        mromero
        last edited by

        http://tjeb.nl/Projects/DNSSEC/index.html

        http://bogussig.dnssec.tjeb.nl/Projects/DNSSEC/index.html

        First One Yes

        Second One No.

        Is there a script to do this? I could set up a page but maybe it is beyond me….

        @clarknova:

        Looks like Borat is no longer with us :(
        http://www.downforeveryoneorjustme.com/dnssec-or-not.org

        Here's another site, although a lot less satisfying to use, and not just because there's no Borat. A lookup failure is really a lame way to confirm that DNSSEC is working, considering many other factors could cause this, leading to an illusion of security. Bravo, Comcast. Anybody know of a better test site? Google results look sparse.

        http://www.dnssec-failed.org

        1 Reply Last reply Reply Quote 0
        • T
          ToxIcon
          last edited by

          Unbound 1.2.9 updated broke

          php: : The command '/usr/local/sbin/unbound-control start'
          returned exit code '1', the output was '[1294954557]
          unbound[37313:0] fatal error: user 'unbound' does not exist.'

          php: /pkg_edit.php: The command '/usr/local/sbin/unbound-control start'
          returned exit code '1', the output was '[1294954577] unbound[60423:0]
          fatal error: user 'unbound' does not exist.'

          php: /pkg_edit.php: The command '/usr/local/sbin/unbound-control start'
          returned exit code '1', the output was '[1294954608] unbound[37078:0]
          fatal error: user 'unbound' does not exist.'

          1 Reply Last reply Reply Quote 0
          • J
            jlepthien
            last edited by

            @ToxIcon:

            Unbound 1.2.9 updated broke

            php: : The command '/usr/local/sbin/unbound-control start'
            returned exit code '1', the output was '[1294954557]
            unbound[37313:0] fatal error: user 'unbound' does not exist.'

            php: /pkg_edit.php: The command '/usr/local/sbin/unbound-control start'
            returned exit code '1', the output was '[1294954577] unbound[60423:0]
            fatal error: user 'unbound' does not exist.'

            php: /pkg_edit.php: The command '/usr/local/sbin/unbound-control start'
            returned exit code '1', the output was '[1294954608] unbound[37078:0]
            fatal error: user 'unbound' does not exist.'

            Try removing and reinstalling the package. Also watch the system.log while installing - you should see that the unbound user is added…

            | apple fanboy | music lover | network and security specialist | in love with cisco systems |

            1 Reply Last reply Reply Quote 0
            • T
              ToxIcon
              last edited by

              Beginning package installation for Unbound…
              Downloading package configuration file... done.
              Saving updated package information... done.
              Downloading Unbound and its dependencies...
              Checking for package installation...
              Downloading http://files.pfsense.org/packages/8/All/unbound-1.4.7.tbz ...  could not download from there or http://ftp2.FreeBSD.org/pub/FreeBSD/ports/i386/packages-8.1-release/All/unbound-1.4.7.tbz.
              of unbound-1.4.7 failed!

              Installation aborted.Backing up libraries...
              Removing package...
              Starting package deletion for unbound-1.4.7...done.
              Starting package deletion for expat-2.0.1_1...done.
              Starting package deletion for libevent-1.4.14b_1...done.
              Removing Unbound components...
              Tabs items... done.
              Menu items... done.
              Services... done.
              Loading package instructions...
              Include file unbound.inc could not be found for inclusion.
              Deinstall commands...
              Not executing custom deinstall hook because an include is missing.
              Removing package instructions...done.
              Auxiliary files... done.
              Package XML... done.
              Configuration... done.
              Cleaning up... Failed to install package.

              Installation halted.

              1 Reply Last reply Reply Quote 0
              • M
                mromero
                last edited by

                Oh boy. Looks like the PFSENSE 2.0 Beta package installation is broken again.

                We had this a few weeks ago with the Squid package - holding off on updating until someone confirms it is fixed.

                I keep two boxes so when the snapshot is broken I go to the other box until a fix issued.  :(

                @ToxIcon:

                Beginning package installation for Unbound…
                Downloading package configuration file... done.
                Saving updated package information... done.
                Downloading Unbound and its dependencies...
                Checking for package installation...
                Downloading http://files.pfsense.org/packages/8/All/unbound-1.4.7.tbz ...  could not download from there or http://ftp2.FreeBSD.org/pub/FreeBSD/ports/i386/packages-8.1-release/All/unbound-1.4.7.tbz.
                of unbound-1.4.7 failed!

                Installation aborted.Backing up libraries...
                Removing package...
                Starting package deletion for unbound-1.4.7...done.
                Starting package deletion for expat-2.0.1_1...done.
                Starting package deletion for libevent-1.4.14b_1...done.
                Removing Unbound components...
                Tabs items... done.
                Menu items... done.
                Services... done.
                Loading package instructions...
                Include file unbound.inc could not be found for inclusion.
                Deinstall commands...
                Not executing custom deinstall hook because an include is missing.
                Removing package instructions...done.
                Auxiliary files... done.
                Package XML... done.
                Configuration... done.
                Cleaning up... Failed to install package.

                Installation halted.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  I did not have any issues updating to 1.2.9

                  Where you could run into issues with download is if your pfsense box is using itself as dns.. Have run into this with even just updates of snaps all the packages fail to reinstall.

                  I just changed mine in general to use 4.2.2.2 and then clicked update from 1.2.8 to 1.2.9 and went smooth as silk..

                  Now looking at the new acl tab, I could create an allow acl – but allow snoop get this error

                  "allow_snoop is not a valid ACL Action. Please select one of the four actions defined in the list."

                  I picked it from the list ;) hehehe

                  edit: btw borat is back with us http://test.dnssec-or-not.org/ is working from here.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  1 Reply Last reply Reply Quote 0
                  • I
                    iFloris
                    last edited by

                    Hey guys,

                    Just saw a pretty interesting piece on the actual safety of DNSSEC as opposed to it's actual safety.
                    Since this thread resolves around the usage and implementation of DNSSEC, this might be relevant to your interests.

                    From 10-devious-new-ways-that-computer-hackers-can-control-your-machines-or-fix-them

                    The greatest DOS attack of all time, and how to stop it forever
                    Among hackers, University of Chicago computer scientist and crypto expert Dan Bernstein (often known by his handle DJB) is a legend. He's written some of the most secure code known to humanity (just try to fuck with qmail - you can't), and has lobbied ceaselessly - and snarkily - for the eradication of broken security systems online. He gave a mad genius presentation where he revealed that the oft-touted network security system DNSSEC is actually so badly-designed that it would make the perfect denial-of-service attack tool. And then he proposed a mindblowing, futuristic system of sending data over the Web that would make it nearly impossible to launch a DOS attack - and would prevent bad guys from sending your secure data to mobsters instead of your bank. The cool part about DJB's new system, based on encryption tools he calls DNSCurve and CurveCP, is that it could be implemented now, on top of the Web as we know it. And the best part? It's lightning fast. Listening to DJB's talk gave me hope for the future of the Web - and his devastating takedown of DNSSEC was the best example of smartypants trolling you'll hear this year.

                    Note - to watch the video, just skip past the first several minutes, where the organizers were setting up the talk and getting everybody seated.

                    And the video.

                    one layer of information
                    removed

                    1 Reply Last reply Reply Quote 0
                    • W
                      wagonza
                      last edited by

                      @johnpoz:

                      "allow_snoop is not a valid ACL Action. Please select one of the four actions defined in the list."

                      I picked it from the list ;) hehehe

                      tut tut - I must have missed that one. Thanks johnpoz, will sort that out.

                      Follow me on twitter http://twitter.com/wagonza
                      http://www.thepackethub.co.za

                      1 Reply Last reply Reply Quote 0
                      • W
                        wagonza
                        last edited by

                        @iFloris:

                        Hey guys,

                        Just saw a pretty interesting piece on the actual safety of DNSSEC as opposed to it's actual safety.
                        Since this thread resolves around the usage and implementation of DNSSEC, this might be relevant to your interests.

                        From 10-devious-new-ways-that-computer-hackers-can-control-your-machines-or-fix-them

                        The greatest DOS attack of all time, and how to stop it forever
                        Among hackers, University of Chicago computer scientist and crypto expert Dan Bernstein (often known by his handle DJB) is a legend. He's written some of the most secure code known to humanity (just try to fuck with qmail - you can't), and has lobbied ceaselessly - and snarkily - for the eradication of broken security systems online. He gave a mad genius presentation where he revealed that the oft-touted network security system DNSSEC is actually so badly-designed that it would make the perfect denial-of-service attack tool. And then he proposed a mindblowing, futuristic system of sending data over the Web that would make it nearly impossible to launch a DOS attack - and would prevent bad guys from sending your secure data to mobsters instead of your bank. The cool part about DJB's new system, based on encryption tools he calls DNSCurve and CurveCP, is that it could be implemented now, on top of the Web as we know it. And the best part? It's lightning fast. Listening to DJB's talk gave me hope for the future of the Web - and his devastating takedown of DNSSEC was the best example of smartypants trolling you'll hear this year.

                        Note - to watch the video, just skip past the first several minutes, where the organizers were setting up the talk and getting everybody seated.

                        And the video.

                        There are so many different conflicting views scattered around the web. Have a look at http://www.isc.org/community/blog/201002/whither-dnscurve for Paul Vixie's take and then various other opinions here http://www.dnssec.net/why-deploy-dnssec

                        Follow me on twitter http://twitter.com/wagonza
                        http://www.thepackethub.co.za

                        1 Reply Last reply Reply Quote 0
                        • I
                          iFloris
                          last edited by

                          @wagonza:

                          There are so many different conflicting views scattered around the web.

                          Thank you for those links, it is very interesting to see the debate on which next-generation dns protocol to use.
                          However, if it is true that dnssec functions as a 30x multiplier for udp packets and the replies can be reflected to a different address, then that would be Very Bad Indeed.
                          Or am I mistaken in assuming this?

                          one layer of information
                          removed

                          1 Reply Last reply Reply Quote 0
                          • W
                            wagonza
                            last edited by

                            @iFloris:

                            Thank you for those links, it is very interesting to see the debate on which next-generation dns protocol to use.
                            However, if it is true that dnssec functions as a 30x multiplier for udp packets and the replies can be reflected to a different address, then that would be Very Bad Indeed.
                            Or am I mistaken in assuming this?

                            Not at all wrong - its debatable on how much network traffic increase it will have but it definitely will increase. The larger size of DNSSEC responses does mean that it wont always fit into the normal UDP DNS traffic. So some of the 'older' DNS servers who are limited to 512bytes might switch to TCP for resolving. This obviously has impact on servers and bandwidth usage. I remember seeing a figure of around an estimated 2% in increase of traffic.

                            I am by no means an expert on the subject and still learning :)

                            Follow me on twitter http://twitter.com/wagonza
                            http://www.thepackethub.co.za

                            1 Reply Last reply Reply Quote 0
                            • W
                              wagonza
                              last edited by

                              @wagonza:

                              @johnpoz:

                              "allow_snoop is not a valid ACL Action. Please select one of the four actions defined in the list."

                              I picked it from the list ;) hehehe

                              tut tut - I must have missed that one. Thanks johnpoz, will sort that out.

                              Fixed.

                              Follow me on twitter http://twitter.com/wagonza
                              http://www.thepackethub.co.za

                              1 Reply Last reply Reply Quote 0
                              • W
                                wagonza
                                last edited by

                                @jlepthien:

                                Also did that update now. Config stays the same, except the interface problem I also have. Just one of my normally three selected interfaces (LAN) was active for the usage of Unbound…

                                Please reinstall and test - it works for me now on the latest commit.

                                Follow me on twitter http://twitter.com/wagonza
                                http://www.thepackethub.co.za

                                1 Reply Last reply Reply Quote 0
                                • J
                                  jlepthien
                                  last edited by

                                  Yep, worked after my latest firmware update. Thanks!

                                  | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                                  1 Reply Last reply Reply Quote 0
                                  • W
                                    wagonza
                                    last edited by

                                    @jlepthien:

                                    Yep, worked after my latest firmware update. Thanks!

                                    wicked! good to hear

                                    Follow me on twitter http://twitter.com/wagonza
                                    http://www.thepackethub.co.za

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      wagonza
                                      last edited by

                                      @johnpoz:

                                      OK so I updated my snap, and now its showing my domain overrides.

                                      Domain overrides

                                      stub-zone:
                                      name: "test.ip"
                                      stub-addr: 192.168.1.4
                                      stub-prime: no

                                      But I agree its not working like it should.. So there is a server at 192.168.1.4 running bind with a zone for test.ip

                                      see – if I query it directly authoritative for the host3 record I created.


                                      ; <<>> DiG 9.7.2-P3 <<>> @192.168.1.4 host3.test.ip
                                      ; (1 server found)
                                      ;; global options: +cmd
                                      ;; Got answer:
                                      ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15037
                                      ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1

                                      ;; QUESTION SECTION:
                                      ;host3.test.ip.                 IN      A

                                      ;; ANSWER SECTION:
                                      host3.test.ip.          21600   IN      A       192.168.1.101

                                      ;; AUTHORITY SECTION:
                                      test.ip.                21600   IN      NS      p4-28g.local.lan.

                                      ;; ADDITIONAL SECTION:
                                      p4-28g.local.lan.       21600   IN      A       192.168.1.4

                                      ;; Query time: 5 msec
                                      ;; SERVER: 192.168.1.4#53(192.168.1.4)
                                      ;; WHEN: Mon Jan 10 23:32:39 2011
                                      ;; MSG SIZE  rcvd: 93


                                      Now if I ask the pfsense box that has an override set to ask 192.168.1.4 for the domain test.ip it also gives me back servfail


                                      ; <<>> DiG 9.7.2-P3 <<>> @192.168.1.253 host3.test.ip
                                      ; (1 server found)
                                      ;; global options: +cmd
                                      ;; Got answer:
                                      ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 49426
                                      ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

                                      ;; QUESTION SECTION:
                                      ;host3.test.ip.                 IN      A

                                      ;; Query time: 11 msec
                                      ;; SERVER: 192.168.1.253#53(192.168.1.253)
                                      ;; WHEN: Mon Jan 10 23:40:03 2011
                                      ;; MSG SIZE  rcvd: 31


                                      So seems domain override is not working??

                                      Currently running
                                      2.0-BETA5 (i386)
                                      built on Mon Jan 10 13:14:45 EST 2011

                                      Ok I managed to get time to simulate this. I see the answer is returned however Unbound is still returning a SERVFAIL. Will investigate further as to why… :-\

                                      Follow me on twitter http://twitter.com/wagonza
                                      http://www.thepackethub.co.za

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        wagonza
                                        last edited by

                                        @wagonza:

                                        @johnpoz:

                                        OK so I updated my snap, and now its showing my domain overrides.

                                        Domain overrides

                                        stub-zone:
                                        name: "test.ip"
                                        stub-addr: 192.168.1.4
                                        stub-prime: no

                                        But I agree its not working like it should.. So there is a server at 192.168.1.4 running bind with a zone for test.ip

                                        see – if I query it directly authoritative for the host3 record I created.


                                        ; <<>> DiG 9.7.2-P3 <<>> @192.168.1.4 host3.test.ip
                                        ; (1 server found)
                                        ;; global options: +cmd
                                        ;; Got answer:
                                        ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15037
                                        ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1

                                        ;; QUESTION SECTION:
                                        ;host3.test.ip.                 IN      A

                                        ;; ANSWER SECTION:
                                        host3.test.ip.          21600   IN      A       192.168.1.101

                                        ;; AUTHORITY SECTION:
                                        test.ip.                21600   IN      NS      p4-28g.local.lan.

                                        ;; ADDITIONAL SECTION:
                                        p4-28g.local.lan.       21600   IN      A       192.168.1.4

                                        ;; Query time: 5 msec
                                        ;; SERVER: 192.168.1.4#53(192.168.1.4)
                                        ;; WHEN: Mon Jan 10 23:32:39 2011
                                        ;; MSG SIZE  rcvd: 93


                                        Now if I ask the pfsense box that has an override set to ask 192.168.1.4 for the domain test.ip it also gives me back servfail


                                        ; <<>> DiG 9.7.2-P3 <<>> @192.168.1.253 host3.test.ip
                                        ; (1 server found)
                                        ;; global options: +cmd
                                        ;; Got answer:
                                        ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 49426
                                        ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

                                        ;; QUESTION SECTION:
                                        ;host3.test.ip.                 IN      A

                                        ;; Query time: 11 msec
                                        ;; SERVER: 192.168.1.253#53(192.168.1.253)
                                        ;; WHEN: Mon Jan 10 23:40:03 2011
                                        ;; MSG SIZE  rcvd: 31


                                        So seems domain override is not working??

                                        Currently running
                                        2.0-BETA5 (i386)
                                        built on Mon Jan 10 13:14:45 EST 2011

                                        Ok I managed to get time to simulate this. I see the answer is returned however Unbound is still returning a SERVFAIL. Will investigate further as to why… :-\

                                        Ok sorted - fix committed. Reinstall package and let me know how it goes.

                                        thx

                                        Follow me on twitter http://twitter.com/wagonza
                                        http://www.thepackethub.co.za

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.