Respectfully, I disagree.
https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html
Thank you for the thought however.
Hi All,
Is there anyone who uses Bind9? I'll setup DNSSEC on all Exits but I would like to validate the config.
I have done this on 41781FDC57238DAB955DF6D6E8400CEC5ACBE706
options { directory "/var/cache/bind";
dnssec-enable yes; dnssec-validation yes;
auth-nxdomain no; # conform to RFC1035 listen-on-v6 { ::1; }; listen-on { 127.0.0.1; }; allow-recursion { 127.0.0.1; ::1; }; };
include "/etc/bind/bind.keys";
When I do a dig +dnssec . | grep ";; flags:" I get ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1 this looks as if its working.
There is no forwarding.
Paul
On 2018-04-11 04:10, Paul Templeton wrote:
When I do a dig +dnssec . | grep ";; flags:" I get ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1 this looks as if its working.
Just to be safe, you could also check the rest of the dig output and /etc/resolv.conf (or relevant resolver configuration on your system) to make sure your BIND is being used. The flags look fine, though.
Kind regards, Alexander
Thanx Alexander
Just to be safe, you could also check the rest of the dig output and /etc/resolv.conf (or relevant resolver configuration on your system) to make sure your BIND is being used. The flags look fine, though.
resolv.conf only has 127.0.0.1 and Dig responds from 127.0.0.1 - Caching works as well.
I'll update the rest of my exits now.
Thanx All
Paul
On 12.04.18 13:05, Alexander Dietrich wrote:
Just to be safe, you could also check the rest of the dig output and /etc/resolv.conf (or relevant resolver configuration on your system) to make sure your BIND is being used.
I have seen hosters where /etc/resolv.conf is overwritten whenever the system reboots, and in these cases I used the following:
# Add this to /etc/tor/torrc ServerDNSResolvConfFile /etc/tor/resolv.conf
# /etc/tor/resolv.conf nameserver 127.0.0.1 # IPv6 alternative #nameserver ::1
-Ralph
Great initiative! Personally I would also see some sort of "DANE" for Tor-relays in the future too, but that is a request for another thread.
/ Jonathan
On 12.04.18 13:05, Alexander Dietrich wrote:
Just to be safe, you could also check the rest of the dig output and /etc/resolv.conf (or relevant resolver configuration on your system) to make sure your BIND is being used.
I have seen hosters where /etc/resolv.conf is overwritten whenever the system reboots, and in these cases I used the following:
# Add this to /etc/tor/torrc ServerDNSResolvConfFile /etc/tor/resolv.conf
# /etc/tor/resolv.conf nameserver 127.0.0.1 # IPv6 alternative #nameserver ::1
-Ralph
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
as a quick and easy test you can always try to resolve a hostname with known invalid DNSSEC records:
www.dnssec-failed.org
Dhalgren Tor:
Respectfully, I disagree.
https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html wrote:
Spent a few minutes activating the DNSSEC trust-anchor for 'unbound'.
Ran 'dig' on a few signed domains and observed that queries that took under 50 milliseconds without went to 2000 milliseconds with.
My attitude toward DNSSEC has deteriorated steadily over time and this finishes it off for me. It's simply not worth the cost. Many serious folk have commented in detail on what a horror show it is.
Disabled it on the exit.
Without DNSSEC, 'unbound' has been reporting:
server stats for thread 0: 1296326 queries, 454942 answers from cache, 841384 recursions, 0 prefetch server stats for thread 0: requestlist max 112 avg 28.1553 exceeded 0 jostled 0 histogram of recursion processing times [25%]=0.00737672 median[50%]=0.0492239 [75%]=0.144125
I'll do some comparisons over some weeks or months and come back to this once I have some more data to show.
tor-relays@lists.torproject.org