BIND-8 to BIND-9 Migration A short tutorial APNIC Meeting, Brisbane, October 2000 Mathias Körber Nominum, Inc. © Copyright.

Slides:



Advertisements
Similar presentations
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Advertisements

1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
School of Electrical Engineering and Computer Science, 2004 Slide 1 Autonomic DNS Experiment Architecture, Symptom and Fault Identification.
2.1 Installing the DNS Server Role Overview of the Domain Name System Role Overview of the DNS Namespace DNS Improvements for Windows Server 2008 Considerations.
DNS server & Client Objectives Contents
DNS Security Extension (DNSSEC). Why DNSSEC? DNS is not secure –Applications depend on DNS ►Known vulnerabilities DNSSEC protects against data spoofing.
DNS Domain name server – a server to translate IP aliases to addresses As you know, IP (internet protocol) works by providing every Internet machine with.
DNS. DNS is a network service that enables clients to resolve names to IP address and vice-versa. Allows machines to be logically grouped by domain names.
1 DNS. 2 BIND DNS –Resolve names to IP address –Resolve IP address to names (reverse DNS) BIND –Berkeley Internet Name Domain system Version 4 is still.
The Domain Name System. CeylonLinux DNS concepts using BIND 2 Hostnames IP Addresses are great for computers –IP address includes information used for.
RNDC & TSIG. What is RNDC? Remote Name Daemon Controller Command-line control of named daemon Usually on same host, can be across hosts –Locally or remotely.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
The Domain Name System Unix System Administration Download PowerPoint Presentation.
DNS & DHCP in the 21st Century William D. Kramp Network Administrator Finger Lakes Community College.
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Domain Name Services Oakton Community College CIS 238.
DNS Domain Name Systems Introduction 1. DNS DNS is not needed for the internet to work IP addresses are all that is needed The internet would be extremely.
Module 10 Advanced Topics. DNS and DHCP DHCP can be configured to auto- update (using DDNS) the forward and reverse map zones Can be secured using allow-update.
Module 3 DNS Types.
Tony Kombol ITIS Who knows this? Who controls this? DNS!
DNS & Mail in the DMZ Jason Heiss Collective Technologies
Advanced Module 3 Stealth Configurations.
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Configuring DNS.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Module 5 BIND Configuration. named.conf – controls operational features Located - Linux: /etc/named.conf /etc/bind/named.conf Located- BSD: /usr/local/etc/named.conf.
Chapter 16 – The Domain Name System (DNS) Presented by Shari Holstege Tuesday, June 18, 2002.
Module 8 DNS Tools & Diagnostics. Objectives Understand dig and nslookup Understand BIND toolset Understand BIND logs Understand wire level messages.
Secured Dynamic Updates. Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 –Snapshot code is available for.
Netprog: DNS and name lookups1 Address Conversion Functions and The Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
Module 2 Zone Files. Objective Understand the idea of a zone and how it relates to a domain name understand zone file structure Understand the major Resource.
FCC CSRIC III Working Group 5 DNSSEC Implementation Practices Steve Crocker CEO, Shinkuro, Inc. March 6, 2013 Working Group 5: DNSSEC.
Tony Kombol ITIS DNS! overview history features architecture records name server resolver dnssec.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Configuring Name Resolution and Additional Services Lesson 12.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
DNS Session 5 Additional Topics Joe Abley AfNOG 2006, Nairobi, Kenya.
Status of DNS David Lawrence, Nominum, Inc. Mathias Koerber, Nominum, Inc. ammended 24aug2001 David Conrad, Nominum, Inc.
CIS 192B – Lesson 2 Domain Name System. CIS 192B – Lesson 2 Types of Services Infrastructure –DHCP, DNS, NIS, AD, TIME Intranet –SSH, NFS, SAMBA Internet.
DNS server & Client Objectives –to learn how to setup dns servers Contents –An Introduction to DNS –How To Download and Install The BIND Packages –How.
Linux Operations and Administration
DNS/Proxy Babu Ram Dawadi. Introduction - DNS Domain Name Server Domain Name Server –programs that store information about the domain name space –largest.
Web Server Administration Chapter 4 Name Resolution.
1 CMPT 471 Networking II DNS © Janice Regan,
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
2/26/2003 Lecture 4 Computer System Administration Lecture 4 Networking Startup/DNS.
DNS Cache Poisoning (pretending to be the authoritative zone) ns.example.co m Webserver ( ) DNS Caching Server Client I want to access
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
AfNOG-2003 Domain Name System (DNS) Ayitey Bulley Setting up an Authoritative Name Server.
Monitoring, analyzing and cleaning DNS configuration errors across European NRENs Slavko Gajin University of Belgrade, Serbia
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
DNS Session 3: Configuration of Authoritative Nameservice Joe Abley AfNOG 2013, Lusaka, Zambia.
DNS Domain name server a server to translate IP aliases to addresses
So You Inherited a DNS Server…
Created by : Ashish Shah, J.M.Patel College, Goregoan West
DNS and Bind Presenter David Wood
RPZ Configuration DNS RPZ Configuration Lecturer: Ron Aitchison
(DNS – Domain Name System)
Domain Name Server Presented By: Mahesh Venkat Adusumelli
Presentation transcript:

BIND-8 to BIND-9 Migration A short tutorial APNIC Meeting, Brisbane, October 2000 Mathias Körber Nominum, Inc. © Copyright 2000 Nominum, Inc.

(C) Copyright 2000 Nominum, Inc.2 BIND versions BIND-4.* - legacy BIND, limited features, security issues BIND-8.* - new, flexible config syntax; many new features (NOTIFY, selective forwarding etc) BIND-9 – total rewrite to prepare for future extensions, new features. Not all features are implemented as yet

(C) Copyright 2000 Nominum, Inc.3 New in BIND-9 Full IPv6 support DNSSEC EDNS0 VIEWS Zonetransfer built-in Light-weight resolver daemon (lwresd)

(C) Copyright 2000 Nominum, Inc.4 Features obsoleted in BIND-9 named-xfer-path (no more separate named-xfer executable) deallocate-on-exit (is on by default now) fake-iquery (always disabled) has-old-clients multiple-cnames (always disabled!) use-id-pool (always on) treat-cr-as-space maintain-ixfr-base controls { unix … } support-ixfr ixfr-base allow-update

(C) Copyright 2000 Nominum, Inc.5 Who should NOT migrate to BIND-9 (yet) statistics dialup Feature per-zone forwarding rfc2301-type1 check-names blackholing $GENERATE lame-TTL serial-queries resource-usage modifiers (*size etc) topology RRset ordering Those who rely on currently unimplemented features:

(C) Copyright 2000 Nominum, Inc.6 Who would want to migrate to BIND-9 Early adopters :-) Those who would like Split-DNS easier

(C) Copyright 2000 Nominum, Inc.7 Basic Migration issues Handling of config file errors Handling of logging New logging categories ACLs case sensitive Default TTL handling Periods in serial numbers no longer allowed Unbalanced quotes RRs across line breaks Unrestricted character set ‘ndc’ replaced by ‘rndc’ which requires configuration

(C) Copyright 2000 Nominum, Inc.8 Handling of config file errors BIND-8 would continue after config file errors, resulting in partial configuration (zones load until the error position) BIND-9 will not start if any error is detected in the named.conf file.

(C) Copyright 2000 Nominum, Inc.9 Handling of Logging Statement BIND-8’s logging statement became effective right after it was read, i.e. configuration errors could be sent to a specific logging channel if logging was specified at the beginning of named.conf. BIND-9’s logging statement will become active only after the complete named.conf file has been read and BIND starts. Any configuration errors will go to the default logging, usually syslog or STDERR Migration issues: Look for configuration errors in syslog or on STDERR Amend any automated log-checkers

(C) Copyright 2000 Nominum, Inc.10 New logging categories BIND-8 default config parser queries lame-servers statistics panic update ncache xfer-in xfer-out db BIND-9 default general database security config resolver xfer-in xfer-out notify client network update eventlib packet notify cname security os insist maintenance load response- checks

(C) Copyright 2000 Nominum, Inc.11 New logging categories Migration action Users who customized their logging will have to adapt their logging configuration to BIND-9’s new categories ! Potential problems if not done: Configuration file errors -> BIND-9 will not start.

(C) Copyright 2000 Nominum, Inc.12 ACL names are case sensitive BIND-8’s ACL names were case insensitive BIND-9’s ACL names are case sensitive Migration action: Adapt all ACL references in your named.conf file to the proper case Potential problems if not done: Configuration file error due to unrecognized ACL names -> BIND will not start

(C) Copyright 2000 Nominum, Inc.13 $TTL 3600 IN SOA primary admin ( ) Default TTL handling has changed BIND-8 used SOA minimum field if no $TTL was found and first RR had not explicit TTL. $TTL 3600 IN SOA primary admin ( ) ERROR Minimum field used ! BIND-9 requires either a $TTL (preferred!) or a TTL on the first RR. Else the zone will not load

(C) Copyright 2000 Nominum, Inc.14 Periods in SOA Serial numbers Some old BIND versions allowed periods in SOA serial numbers (eg: 3.002) Special, highly obscure calculations involved. Primary will convert to integer when zone is loaded Not widely used, usually recommended against BIND-9: Serial numbers restricted to integers only Migration issue: Secondaries: none (calculation will have been performed on primary) Primaries: change zonefiles !

(C) Copyright 2000 Nominum, Inc.15 Unbalanced quotes Some versions of BIND did not complain about unbalanced quotes Missing closing quotes were added at end-of line BIND-9: Very strict about quoting, will continue reading string until next quotes Migration issue: Potentially, old errors may surface and affect zone loading. Clean up zonefiles!

(C) Copyright 2000 Nominum, Inc.16 RRs across line breaks Some versions of BIND allow opening parenthesis on the second line of a multi-line resource IN SOA primary admin ( ) BIND-9 requires the opening parenthesis on the first IN SOA primary admin ( )

(C) Copyright 2000 Nominum, Inc.17 Unrestricted character set Older BIND versions attempted to protect applications from security breaches by discarding data containing ‘inappropriate’ characters. See: CA BIND-9 is 8-bit-clean in accordance with RFC2181. BIND-9 will not discard data to protect vulnerable applications. Migration issues: Replace vulnerable applications Hostnames should follow RFC952 rules !

(C) Copyright 2000 Nominum, Inc.18 rndc(1) instead of ndc(1) Rndc allows management of several remote nameservers Authentication via TSIG keys Requires configuration Migration issues Must use control statement in named.conf Note: UNIX sockets deprecated ! Must setup rndc.conf

(C) Copyright 2000 Nominum, Inc.19 Lightweight Resolver Library & lwresd Daemon BIND-8 Stub resolver compiled into all applications (-lresolv or – lbind) Problem: IPv6 introduced additional complexity best handled at the resolver end, which the old resolver cannot handle BIND-9 New lightweight resolver lib Used new resolver daemon (separate process on the same system) ‘lwresd’

(C) Copyright 2000 Nominum, Inc.20 lwresd Acts like a caching nameserver on the local system Requires minimum or no configuration Uses the servers listed in the nameservers entries in /etc/resolv.conf as forwarders able to handle new IPv6 requirements Following A6 chains and DNAME records, simultaneous lookup of IPv4 and IPv6 addresses simple UDP protocol between new lightweight resolver lib and lwresd. NOT DNS !

(C) Copyright 2000 Nominum, Inc.21 IXFR changes BIND-8 support-ixfr maintain-ixfr-base obsolete in BIND-9 max-ixfr-log-size currently not implemented ixfr-base ignored in BIND-9 BIND-9 request-ixfr provide-ixfr IXFR journal file is always zonename.jnl

(C) Copyright 2000 Nominum, Inc.22 Example: BIND-8 Split DNS Clients x.x inside outside zonetransfer of internal zones Reply for internal zones zonetransfer of external zones fwd all queries for non-local zones iNS iNS iPRI GWNS (int) (ext) eNS eNS ePRI (int) (pub)

(C) Copyright 2000 Nominum, Inc.23 BIND-8 Split DNS configs iNS1 & iNS2 GWNS acl “iPRI” { ; }; acl “GWNS” { ; }; options { forwarders { GWNS; }; forward only; recursion yes; }; zone “example.com” { type slave; masters { iPRI; }; acl “INTERNAL” { /16; }; acl “PRIVINTF” { ; }; ccl “PUBINTF” { ; }; options { allow-query {INTERNAL; }; recursion yes; listen-on { PRIVINTF; }; query-source address PUBINTF port *; };

(C) Copyright 2000 Nominum, Inc.24 BIND-8 Split DNS configs iPRI clients acl “iNSes” { ; ;}; options { recursion no; allow-transfer { iNSes; }; allow-query { iNSes; }; }; Zone “example.com” { type master; filename “/private/example.db”; }; /etc/resolv.conf: nameserver nameserver

(C) Copyright 2000 Nominum, Inc.25 BIND-8 Split DNS configs eNS1 & eNS2 ePRI acl “ePRI” { ; }; options { recursion no; allow-query { any; }; allow-transfer { none; }; }; Zone “example.com” { type slave; file “sec/example.db”; masters { ePRI; }; acl “eNSes” { ; ; }; options { allow-transfer {eNSes; }; recursion no; allow-query { eNSes; }; }; Zone “example.com” { type master; file “/public/example.db”; };

(C) Copyright 2000 Nominum, Inc.26 SPLIT DNS with BIND-9 NS NS iPRI ePRI zonetransfer of internal zones zonetransfer of external zones Query for ‘example.com’ Reply with internal data Query for ‘example.com’ Reply with external data

(C) Copyright 2000 Nominum, Inc.27 BIND-9 Split DNS config NS1 and NS2 acl “iPRI” { ; }; acl “ePRI” { ; }; options { recursion no; allow-query { any; }; allow-transfer { none; }; }; view “internal” { match-clients { /16; }; options { recursion yes; }; zone “example.com” { type slave; file “int/example.db”; masters { iPRI; }; }; view “external” { match-clients { ! /16; }; options { recursion no; }; zone “example.com” { type slave; file “ext/example.com”; masters { ePRI; }; };

(C) Copyright 2000 Nominum, Inc.28 BIND-9 Split DNS configs iPRI & ePRI acl “NSes” { ; ; }; options { recursion no; allow-query { none; }; allow-transfer { none; }; notify yes; }; zone “example.com” { type slave; file “example.db”; allow-query { NSes }; allow-transfer { NSes; }; }; The only difference between iPRI and ePRI is the contents of the zonefile for ‘example.com’ (and of course their IP address). iPRI and ePRI could run on the same machine, if 2 instances of named are used, each with its own IP address !

(C) Copyright 2000 Nominum, Inc.29 Alternative SPLIT DNS w/ BIND-9 PRI iSEC eSEC zonetransfer of internal zones zonetransfer of external zones Query for ‘example.com’ Reply with internal data Query for ‘example.com’ Reply with external data eSEC Fwd queries for External domains

(C) Copyright 2000 Nominum, Inc.30 Alternative split DNS w/ BIND-9 PRI acl “internal” { /16; }; acl “iSEC” { ; }; acl “eSECs” { ; ; }; options { recursion yes; forwarders { eSECs; }; }; view “internal” { match-clients { internal; }; zone “example.com” { type master; file “int/example.db”; allow-transfer { iSEC; }; allow-query { internal; }; }; view “external” { match-clients { eSECs; }; zone “example.com” { file master; file”ext/example.db”; allow-transfer { eSECs; }; allow-query { eSECs; }; };

(C) Copyright 2000 Nominum, Inc.31 Alternative split DNS w/ BIND-9 iSEC acl “internal” { /16; }; acl “PRI” { ; }; acl “eSECs” { ; ; }; options { recursion yes; forwarders { eSECs; }; }; view “internal” { match-clients { internal; }; zone “example.com” { type slave; masters { PRI; }; file “int/example.db”; }; eSEC1 & eSEC2 acl “PRI” { ; }; acl “internal” { ; ; }; options { recursion no; }; view “external” { match-clients { ! internal; }; zone “example.com” { type slave; masters { PRI; }; file “sec/example.db”; }; view “internal” { match-clients { internal; }; options { recursion yes; }; };

(C) Copyright 2000 Nominum, Inc.32 Split DNS with BIND-9 If both primary and secondary server are to be the same for an internal and an external view, additional IP addresses are required (because there is no way to distinguish which view is meant in a serial# query or zonetransfer).

(C) Copyright 2000 Nominum, Inc.33 PRIMARY This will NOT Work ! Reason: with BOTH servers using only 1 IP address each, there is no way to distinguish requests for the internal view from those for the external view (SOA query and zonetransfer request) Workaround: Secondary with 2 IP addresses (transfer-source) or two primaries (2 instances of BIND on the same server?) Zonetransfer of external view Zonetransfer of internal view The same primary and secondary for different views of the same zone: SECONDARY

(C) Copyright 2000 Nominum, Inc.34 Alternatives to BIND-9 For those who can or don’t want to use BIND-9 yet (available from ): BIND p5 BIND (to be released Real-Soon-Now) All prior versions of BIND have security problems !

(C) Copyright 2000 Nominum, Inc.35 References, Further Reading etc The BIND-9 Administrators Reference Manual BIND-8 to BIND-9 Migration Notes /usr/src/bind-9.0.0/doc/misc/migration Implementation status of BIND-9 options /usr/src/bind-9.0.0/doc/misc/options