* [Fwd: Re: request for info: unbound via https / tls] [not found] <1525184928.3530.13.camel@gmail.com> @ 2018-05-01 14:33 ` Paul Simmons 2018-05-01 14:40 ` Peter Müller 0 siblings, 1 reply; 28+ messages in thread From: Paul Simmons @ 2018-05-01 14:33 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 27 bytes --] Forgot the list cc :-(. [-- Attachment #2: attachment.eml --] [-- Type: message/rfc822, Size: 9564 bytes --] TWVzc2FnZS1JRDogPDE1MjUxODQ5MjguMzUzMC4xMy5jYW1lbEBnbWFpbC5jb20+ClN1YmplY3Q6 IFJlOiByZXF1ZXN0IGZvciBpbmZvOiB1bmJvdW5kIHZpYSBodHRwcyAvIHRscwpGcm9tOiBQYXVs IFNpbW1vbnMgPG1iYXRyYW5jaEBnbWFpbC5jb20+ClRvOiBNaWNoYWVsIFRyZW1lciA8bWljaGFl bC50cmVtZXJAaXBmaXJlLm9yZz4KRGF0ZTogVHVlLCAwMSBNYXkgMjAxOCAwOToyODo0OCAtMDUw MApJbi1SZXBseS1UbzogPDE1MjUxMTY1NDYuMjQ3OTQ3MS4xODMuY2FtZWxAaXBmaXJlLm9yZz4K UmVmZXJlbmNlczogPDE1MjI4NjM1MTAuMjExMjYuMTkuY2FtZWxAZ21haWwuY29tPgoJIDwxNTIy OTIxNDMwLjEwMDkzMTIuNTUuY2FtZWxAaXBmaXJlLm9yZz4KCSA8MTUyMjkzNDkxNS4yMTEyNi40 Mi5jYW1lbEBnbWFpbC5jb20+IDwxNTIyOTM4NzE4LjI3MTcuMTIuY2FtZWxAaXBmaXJlLm9yZz4K CSA8MTUyNTExNjU0Ni4yNDc5NDcxLjE4My5jYW1lbEBpcGZpcmUub3JnPgpPcmdhbml6YXRpb246 IEZJRk8KQ29udGVudC1UeXBlOiB0ZXh0L3BsYWluOyBjaGFyc2V0PSJVVEYtOCIKWC1NYWlsZXI6 IEV2b2x1dGlvbiAzLjI2LjYgKDMuMjYuNi0xLmZjMjcpIApNaW1lLVZlcnNpb246IDEuMApDb250 ZW50LVRyYW5zZmVyLUVuY29kaW5nOiA3Yml0CgpPbiBNb24sIDIwMTgtMDQtMzAgYXQgMjA6Mjkg KzAxMDAsIE1pY2hhZWwgVHJlbWVyIHdyb3RlOgo+IEFueSBsdWNrIHdpdGggdGVzdGluZz8KPiAK PiBJIGVuYWJsZWQgRE5TLW92ZXItVExTIG9uIHRoZSBMaWdodG5pbmcgV2lyZSBMYWJzIHNwb25z b3JlZCByZXNvbHZlcgo+IHRvZGF5IEAKPiA4MS4zLjI3LjU0LiBNYXliZSB5b3UgY2FuIHVzZSB0 aGlzIG9uZSBmb3IgdGVzdGluZy4KPiAKPiBCZXN0LAo+IC1NaWNoYWVsCgpUaGFua3MgZm9yIHRo ZSBETlMvVExTIHJlc29sdmVyISAgSSd2ZSBiZWVuIHVzaW5nIDkuOS45LjkgYW5kIDEuMC4wLjEK dG8gdGVzdC4KClRoZSB1bmJvdW5kIGluaXQgYW5kIHRoZSBjZ2kgc2NyaXB0cyB1c2UgZGlnIDku MTEuMywgd2hpY2ggaGFzIG5vCm5hdGl2ZSBzdXBwb3J0IGZvciBUTFMuICBJJ20gdHJ5aW5nIHRv IGNvbmZpZ3VyZSBzdHVubmVsIHRvIGFjdCBhcyBNSVRNCnNvIHRoYXQgZGlnIGNhbiBzdWNjZWVk LiAgSSBob3BlIHRvIHJlc3RyaWN0IHVuYm91bmQgdG8gcG9ydCA4NTMgZm9yCmxpc3RlbiBhbmQg c2VuZCwgYW5kIHVzZSBzdHVubmVsIHRvIGxpc3RlbiBvbiBwb3J0IDUzIGFuZCBmb3J3YXJkIHRv Cjg1My4KClN0aWxsIHBva2luZyBpdCwgYnV0IHNvIGZhciBhbGwgaXQgZG9lcyBpcyBzcXVlYWwu ICBJJ20gbm90IHRoZSBhZG1pbiBJCnVzZWQgdG8gYmUgKHJldGlyZWQpLiAgQmFieSBzdGVwcyEK ClBhdWwKCj4gCj4gT24gVGh1LCAyMDE4LTA0LTA1IGF0IDE1OjMxICswMTAwLCBNaWNoYWVsIFRy ZW1lciB3cm90ZToKPiA+IEhpLAo+ID4gCj4gPiBPbiBUaHUsIDIwMTgtMDQtMDUgYXQgMDg6Mjgg LTA1MDAsIFBhdWwgU2ltbW9ucyB3cm90ZToKPiA+ID4gT24gVGh1LCAyMDE4LTA0LTA1IGF0IDEw OjQzICswMTAwLCBNaWNoYWVsIFRyZW1lciB3cm90ZToKPiA+ID4gPiBIZWxsbyBQYXVsLAo+ID4g PiA+IAo+ID4gPiA+IHF1aXRlIGhhcHB5IHRoYXQgd2UgYXJlIG5vdyBoYXZpbmcgYSBjb252ZXJz YXRpb24gYWJvdXQgdGhpcy4gSQo+ID4gPiA+IGhhdmUKPiA+ID4gPiBiZWVuCj4gPiA+ID4gY29u c2lkZXJpbmcgd3JpdGluZyBzb21ldGhpbmcgbXlzZWxmLCBidXQgSSBkaWRuJ3Qgd2FudCB0bwo+ ID4gPiA+IGFwcGVhciBzbwo+ID4gPiA+IGdydW1weQo+ID4gPiA+IGFnYWluIDopCj4gPiA+ID4g Cj4gPiA+ID4gSSBoYXZlIGEgaHVnZSBpc3N1ZSB3aXRoIHRoYXQgZGlzY3Vzc2lvbiBvciBtZWRp YSBjb3ZlcmFnZSB0aGF0Cj4gPiA+ID4gaXMKPiA+ID4gPiBzdWRkZW5seSBvdXQKPiA+ID4gPiB0 aGVyZSwgZXNwZWNpYWxseSBzaW5jZSAxLjEuMS4xIGlzIGxpdmUuIFBvaW50cyBhcmUgKGluIGJy aWVmKToKPiA+ID4gPiAKPiA+ID4gPiAqIFRoZXJlIGlzIG5vIGFkdmFudGFnZSB0byBwcml2YWN5 IGFueW9uZSBoYXMgaGVyZS4gSXQgaXMgYQo+ID4gPiA+IGh1Z2UKPiA+ID4gPiBjb3Jwb3JhdGlv bgo+ID4gPiA+IHRoYXQgaXMgcnVubmluZyB0aGlzIEROUyBzZXJ2aWNlLiBJIGRvIG5vdCBzZWUg d2h5IEkgc2hvdWxkCj4gPiA+ID4gdHJ1c3QKPiA+ID4gPiB0aGVtIG1vcmUgdGhlbgo+ID4gPiA+ IHRoZSBjb21wZXRpdG9ycyBsaWtlIDguOC44Ljggb3IgOS45LjkuOSBvciB3aGF0IGV2ZXIgaXMg b3V0Cj4gPiA+ID4gdGhlcmUKPiA+ID4gPiB0aGF0IGRvZXNuJ3QKPiA+ID4gPiBoYXZlIGEgZmFu Y3kgSVAgYWRkcmVzcy4KPiA+ID4gPiAKPiA+ID4gPiBJIHdvdWxkIGFzc3VtZSB0aGF0IHRoZXkg YXJlIGFsbCBjb2xsZWN0aW5nIGRhdGEgYWJvdXQgdGhlaXIKPiA+ID4gPiB1c2Vycy4KPiA+ID4g PiBUaGV5IGFyZSBhbGwKPiA+ID4gPiBidXNpbmVzc2VzIHRoYXQgYXJlIG1ha2luZyBtb25leSBh bmQgc2luY2UgdGhpcyBzZXJ2aWNlIGlzCj4gPiA+ID4gYmVpbmcKPiA+ID4gPiBvZmZlcmVkIGZv cgo+ID4gPiA+IGZyZWUsIHRoZSBtb25leSB0aGF0IHBheXMgZm9yIGl0IGhhcyB0byBjb21lIGZy b20gc29tZXdoZXJlCj4gPiA+ID4gZWxzZS4uLgo+ID4gPiA+IFlvdSBrbm93IHRoZQo+ID4gPiA+ IGRyaWxsLgo+ID4gPiA+IAo+ID4gPiAKPiA+ID4gQWdyZWVkLCBhbHRob3VnaCBDbG91ZGZsYXJl IGhhdmUgc3RhdGVkIHRoYXQgdGhleSBhcmVuJ3QKPiA+ID4gaW50ZXJlc3RlZCBpbgo+ID4gPiBt YXJrZXRpbmcgdG8gb3IgdGFyZ2V0aW5nIHVzZXJzLCBhbmQgcmVhbGx5IGhhdmUgbm8gaW50ZXJl c3QgaW4KPiA+ID4gd2hvIGlzCj4gPiA+IHJlc29sdmluZyB3aGF0Lgo+ID4gCj4gPiBZZXMgdGhl eSBkaWQsIGJ1dCBhcyBsb25nIGFzIHRoZXJlIGlzIG5vIHRlY2huaWNhbCBndWFyYW50ZWUgZm9y Cj4gPiB0aGlzLAo+ID4gSSB3b24ndCBiZWxpZXZlIGl0IChRdW90ZSBzaGFtZWxlc3NseSBzdG9s ZW4gZnJvbSBQZXRlcikuCj4gPiAKPiA+ID4gPiAqIFRoYXQgYmVpbmcgc2FpZCwgRE5TIG92ZXIg VExTIG9yIEROUyBvdmVyIFggZG9lcyBub3QgaGVscCB0bwo+ID4gPiA+IHByb3RlY3QgdGhhdAo+ ID4gPiA+IHByaXZhY3kgZnJvbSB0aG9zZSBjb3Jwb3JhdGlvbnMuIEl0IGlzIGp1c3QgdHJhbnNw b3J0Cj4gPiA+ID4gZW5jcnlwdGlvbi4gSQo+ID4gPiA+IGRvIG5vdCBhdAo+ID4gPiA+IGFsbCBz ZWUgaG93IHBlb3BsZSBjYW4gY29uZnVzZSB0aGlzLgo+ID4gPiA+IAo+ID4gPiA+ICogVGhlbiwg SSB0aGluayB0aGF0IEROUyBvdmVyIEhUVFBTIGlzIGNvbXBsZXRlIG5vbi1zZW5zZS4KPiA+ID4g PiBQZW9wbGUKPiA+ID4gPiBoYXZlIGJlZW4KPiA+ID4gPiBjb21wbGFpbmluZyBmb3IgYSB2ZXJ5 IGxvbmcgdGltZSB0aGF0IEROU1NFQyBhZGRzIHRvbyBtdWNoCj4gPiA+ID4gb3ZlcmhlYWQuCj4g PiA+ID4gSG93IGRvZXMKPiA+ID4gPiBIVFRQUyBmaXQgaW4gaGVyZT8gQW5kIHRvIHRoZSBwZW9w bGUgd2hvIGFyZSBiZWluZyBhIHByb3h5IHRoYXQKPiA+ID4gPiBkb2Vzbid0IGFsbG93Cj4gPiA+ ID4gYW55dGhpbmcgZWxzZSB0byBwYXNzIHRocm91Z2gsIHlvdSBhcmUgbm90IHVzaW5nIHRoZSBJ bnRlcm5ldC4KPiA+ID4gPiBZb3UKPiA+ID4gPiBhcmUgdXNpbmcKPiA+ID4gPiBzb21ldGhpbmcg ZWxzZS4gR2V0IG91dCBvZiB0aGVyZS4KPiA+ID4gPiAKPiA+ID4gPiAqIFNvIGJhc2ljYWxseSB3 ZSBoYXZlIGFub3RoZXIgcGllY2Ugb2YgdGVjaG5vbG9neSB0aGF0IGlzCj4gPiA+ID4gYWN0dWFs bHkKPiA+ID4gPiBxdWl0ZSB1c2VmdWwKPiA+ID4gPiBoeXBlZCBmb3Igbm8gcmVhc29uLiBQZW9w bGUgd2lsbCBldmVudHVhbGx5IGZpbmQgb3V0IHRoYXQgaXQKPiA+ID4gPiBkb2Vzbid0Cj4gPiA+ ID4gZG8gd2hhdAo+ID4gPiA+IHRoZXkgd2VyZSBleHBlY3RpbmcgYW5kIGFiYW5kb25pbmcgaXQg b3Igc29tZXRoaW5nIGVsc2UuIFRoYXQKPiA+ID4gPiBpcwo+ID4gPiA+IGZydXN0cmF0aW5nLgo+ ID4gPiA+IAo+ID4gPiA+ICogQnV0IGFsbCBpbiBhbGwsIEROUyBjb3VsZCBkbyB3aXRoIGEgYml0 IG9mIGFuIHVwZGF0ZS4gSXQKPiA+ID4gPiB3b3JrcyB3ZWxsCj4gPiA+ID4gYXMgYQo+ID4gPiA+ IHByb3RvY29sIGJ1dCBsYWNrcyBzb21lIGZlYXR1cmVzIGxpa2UgdGhlIHByaXZhY3kuIFNvIEkg c3VwcG9zZQo+ID4gPiA+IHVzaW5nCj4gPiA+ID4gYSBUTFMKPiA+ID4gPiB0dW5uZWwgdG8gY29t bXVuaWNhdGUgdG8gYSAqdHJ1c3RlZCogcmVzb2x2ZXIgd291bGQgZ2l2ZSB1cwo+ID4gPiA+IHRo YXQKPiA+ID4gPiBwcml2YWN5IHdoZXJlCj4gPiA+ID4gd2Ugd2FudCBpdC4gQW5kIHdoYXQgZXZl ciByZXNvbHZlciBwZW9wbGUgYXJlIHVzaW5nIGlzIGVudGlyZWx5Cj4gPiA+ID4gdXAgdG8KPiA+ ID4gPiB0aGVtLgo+ID4gPiA+IAo+ID4gPiA+IE9uIFdlZCwgMjAxOC0wNC0wNCBhdCAxMjozOCAt MDUwMCwgUGF1bCBTaW1tb25zIHdyb3RlOgo+ID4gPiA+ID4gRm9yIENvcmUxMTksIEknbSBjdXJy ZW50bHkgdXNpbmcgYSBwYXRjaCB0bwo+ID4gPiA+ID4gL2V0Yy9pbml0LmQvdW5ib3VuZDoKPiA+ ID4gPiA+IAo+ID4gPiA+ID4gIGh0dHBzOi8vZ2l0bGFiLmNvbS9zbmlwcGV0cy8xNzA2ODA0Cj4g PiA+ID4gPiAKPiA+ID4gPiA+IGJlY2F1c2UgbXkgKG9ubHkgYXZhaWxhYmxlKSBJU1AgbWFuZ2xl cyBwb3J0IDUzIHRyYWZmaWMsCj4gPiA+ID4gPiBlZmZlY3RpdmVseQo+ID4gPiA+ID4gZGlzYWJs aW5nIEROUyBvdXRzaWRlIG9mIG15IHByaXZhdGUgZmlyZXdhbGwuCj4gPiA+ID4gPiAKPiA+ID4g PiA+IEkgd29uZGVyIGlmIGNvbmZpZ3VyaW5nIHVuYm91bmQgc28gdGhhdCBmb3J3YXJkIHJlcXVl c3RzIHVzZQo+ID4gPiA+ID4gRE5TU0VDCj4gPiA+ID4gPiBvdmVyIEhUVFBTIG9yIFRMUyB3b3Vs ZCBiZSBhIGJldHRlciAoYW5kIG1vcmUgc2VjdXJlKQo+ID4gPiA+ID4gc29sdXRpb24/Cj4gPiA+ ID4gPiBBbHNvCj4gPiA+ID4gPiBzZWU6Cj4gPiA+ID4gCj4gPiA+ID4gSSB0aGluayB0aGF0IGlz IHRoZSByaWdodCBwYXRoLiBUaGVyZSBpcyBkZWxpYmVyYXRlbHkgbm8gc3dpdGNoCj4gPiA+ID4g dG8KPiA+ID4gPiB0dXJuIEROU1NFQwo+ID4gPiA+IG9mZi4gSSB0aGluayB0aGF0IGRvZXNuJ3Qg bWFrZSBzZW5zZS4gSXQgZmVlbHMgYSBiaXQgbGlrZQo+ID4gPiA+IGxpY2tpbmcgYQo+ID4gPiA+ IHRvaWxldCBzZWF0Lgo+ID4gPiA+IFlvdSB0aGF0IHRoZXJlIGlzIHNvbWUgZGFuZ2VyIHRoZXJl IGFuZCB0aGVyZWZvcmUgaXQgaXMgYQo+ID4gPiA+IHJlYWxseSBiYWQKPiA+ID4gPiBpZGVhIHRv IGRvCj4gPiA+ID4gaXQgYWx0aG91Z2ggaW4gdGhlb3J5IHRoYXQgb3B0aW9uIGlzIHRoZXJlLgo+ ID4gPiAKPiA+ID4gSWNrISBUaGFua3MgZm9yIHN0aWNraW5nIHRoYXQgaW1hZ2UgaW4gbXkgYnJh aW4hIDotKQo+ID4gCj4gPiBJIGFtIHVuZm9ydHVuYXRlbHkgbGFja2luZyBiZXR0ZXIgZXhhbXBs ZXMgdGhhdCBzaG93IHRoZQo+ID4gc2VyaW91c25lc3Mgb2YKPiA+IHNvbWV0aGluZyB0aGF0IHBl b3BsZSB3YW50IHRvIGRvIHdyb25nLi4uCj4gPiAKPiA+ID4gSSdtIHByaW1hcmlseSBpbnRlcmVz dGVkIGluIGNpcmN1bXZlbnRpbmcgdGhlIElTUCBtdW5naW5nIEROU1NFQy4KPiA+ID4gSQo+ID4g PiBzdXBwb3NlIEknbSByZXByZXNlbnRpbmcgYSBzbWFsbCBjb3JuZXIgY2FzZS4gVGhlcmUgYXJl IG5vCj4gPiA+IGNvbm5lY3Rpb25zCj4gPiA+IGF2YWlsYWJsZSB0byBtZSBleGNlcHQgSHVnaGVz TmV0IChIdWdoZXNOMFQgOi0pLiAKPiA+IAo+ID4gWWVzLCB0aGF0IGlzIGEgdmVyeSBnb29kIHJl YXNvbi4KPiA+IAo+ID4gVGhpcyBpcyBhIGJpdCBvZiBhIGNvcm5lciBjYXNlIGJ1dCB0aGVyZSBp cyBhIG51bWJlciBvZiB1c2VycyB3aXRoCj4gPiB0aGlzCj4gPiBwcm9ibGVtLiBBbmQgSSB0aGlu ayB0aGVyZSBhcmUgYSBsb3QgbW9yZSBwZW9wbGUgd2hvIGRvbid0IHRydXN0Cj4gPiB0aGVpcgo+ ID4gSVNQIG9yIGRvIG5vdCBuZWVkIHRvIHRydXN0IHRoZWlyIElTUC4gSG9uZXN0bHksIEkgd291 bGQgcHJlZmVyIHRvCj4gPiB1c2UKPiA+IEROUyBvdmVyIFRMUyBhbGwgdGhlIHRpbWUuCj4gPiAK PiA+IEEgdGhpbmcgdGhhdCBJIGZvcmdvdCB0byBtZW50aW9uIGluIG15IGZpcnN0IGVtYWlsOiBJ IHRoaW5rIGl0IGlzCj4gPiB3YXkKPiA+IG1vcmUgbGlrZWx5IHRoYXQgdGhlIEROUyBob3N0ZXIg aXMgInNweWluZyIgb24geW91IHRoYW4gdGhlIElTUC4gT2YKPiA+IGNvdXJzZSB0aGUgSVNQIGhh cyB0aGUgY2hhbmNlIHRvIGRvIGl0IGFuZCBpdCBpcyBwcmFjdGljYWwsICBidXQgSQo+ID4gc3Vw cG9zZSB0aGVyZSBpcyBhIGJpZ2dlciBpbnRlcmVzdCBpbiBoYXJ2ZXN0aW5nIHRoZSBkYXRhIGZv cgo+ID4gYWR2ZXJ0aXNpbmcgYW5kIHNvIG9uLiBIZW5jZSBteSBjcml0aWNpc20gb2YgR29vZ2xl LCBDbG91ZGZsYXJlLAo+ID4gZXRjLgo+ID4gCj4gPiA+IAo+ID4gPiA+IAo+ID4gPiA+ID4gaHR0 cHM6Ly9mb3J1bS5pcGZpcmUub3JnL3ZpZXd0b3BpYy5waHA/Zj0yNyZ0PTIwNTc1I3AxMTUzNDIK PiA+ID4gPiA+IAo+ID4gPiA+ID4gaHR0cHM6Ly9mb3J1bS5pcGZpcmUub3JnL3ZpZXd0b3BpYy5w aHA/Zj01MCZ0PTIwNTc0Cj4gPiA+ID4gPiAKPiA+ID4gPiA+IENvbW1lbnRzIGFuZCB0ZXN0IGNv bmZpZ3VyYXRpb25zIGFyZSB3ZWxjb21lIQo+ID4gPiA+IAo+ID4gPiA+IEluIENvcmUgVXBkYXRl IDEyMCwgdW5ib3VuZCBoYXMgYmVlbiB1cGRhdGVkIHRvIDEuNy4wIGFuZAo+ID4gPiA+IHN1cHBv cnRzCj4gPiA+ID4gRE5TIG92ZXIgVExTLgo+ID4gPiA+IEZvcmdldCBhYm91dCBETlMgb3ZlciBI VFRQUy4gSSBjb3VsZG4ndCBmaW5kIHRoZSB0aW1lIHlldCB0bwo+ID4gPiA+IGZ1bGx5Cj4gPiA+ ID4gdXBkYXRlIG91cgo+ID4gPiA+IHJlc29sdmVyIHRoYXQgd2UgaG9zdCB0byBlbmFibGUgRE5T IG92ZXIgVExTLCB0b28gYnV0IHRoYXQgaXMKPiA+ID4gPiBvbiBteQo+ID4gPiA+IGxpc3QuCj4g PiA+ID4gCj4gPiA+ID4gU28gd2hhdCBjb3VsZCB0aGlzIGFsbCBsb29rIGxpa2U/IFdlIGJhc2lj YWxseSB3b3VsZCBuZWVkIGEKPiA+ID4gPiBzd2l0Y2gKPiA+ID4gPiB0aGF0IHRlbGxzCj4gPiA+ ID4gdW5ib3VuZCAqb25seSogdG8gY29udGFjdCB0aGUgcmVzb2x2ZXJzIG92ZXIgVExTLiBJIHRo aW5rIHRoYXQKPiA+ID4gPiBzaG91bGQKPiA+ID4gPiBzb2x2ZSBpdCwKPiA+ID4gPiBidXQgcGVv cGxlIG5lZWQgdG8gYmUgYXdhcmUgdGhhdCB0aGV5IHdvbid0IGhhdmUgYW55IEROUwo+ID4gPiA+ IHJlc29sdXRpb24KPiA+ID4gPiB3aGVuIHRoZWlyCj4gPiA+ID4gdXBzdHJlYW0gRE5TIHNlcnZl cnMgZG9uJ3Qgc3VwcG9ydCBpdCBvciBpbiByZWN1cnNvciBtb2RlLgo+ID4gPiA+IAo+ID4gPiA+ IEFsc28gYWxsIG9mIHRoZSB0ZXN0cyB0aGF0IHdlIGFyZSBydW5uaW5nIGluIHRoZSB1bmJvdW5k IGluaXQKPiA+ID4gPiBzY3JpcHQKPiA+ID4gPiBwcm9iYWJseQo+ID4gPiA+IHdvbid0IGJlIGFi bGUgdG8gcnVuIHNpbmNlIGRpZyBkb2Vzbid0IHN1cHBvcnQgRE5TIG92ZXIgVExTLgo+ID4gPiA+ IGJpbmQgYXMKPiA+ID4gPiBhIHdob2xlCj4gPiA+ID4gZG9lcyBub3Qgc3VwcG9ydCBpdCAoeWV0 PykuIFNvIHdlIG5lZWQgYSBzb2x1dGlvbiBmb3IgdGhhdC4KPiA+ID4gCj4gPiA+IEFncmVlZC4g VGhlIG9ubHkgcmVmZXJlbmNlcyBJJ3ZlIGZvdW5kIHRvIHVzaW5nIGJpbmQgb3ZlciBUTFMKPiA+ ID4gaW52b2x2ZQo+ID4gPiB1c2luZyBhIHByb3h5IC8gdHVubmVsLgo+ID4gCj4gPiB1bmJvdW5k IGluIENvcmUgMTIwIGRvZXMgaXQuCj4gPiAKPiA+IGh0dHBzOi8vd3d3LnVuYm91bmQubmV0L2Rv Y3VtZW50YXRpb24vdW5ib3VuZC5jb25mLmh0bWwKPiA+IAo+ID4gQ2hlY2sgZm9yIHRscy11cHN0 cmVhbTogeWVzCj4gPiAKPiA+ID4gCj4gPiA+ID4gCj4gPiA+ID4gV2Ugd291bGQgYWxzbyBuZWVk IGEgbmV3IENHSSBzY3JpcHQgdGhhdCBnaXZlcyB1c2VycyB0aGUgb3B0aW9uCj4gPiA+ID4gdG8K PiA+ID4gPiBjb25maWd1cmUKPiA+ID4gPiB0aGlzIG5pY2VseS4gRE5TIGlzIHNjYXR0ZXJlZCBh bGwgYXJvdW5kLiBTZXJ2ZXJzIGFyZQo+ID4gPiA+IGNvbmZpZ3VyZWQgaW4KPiA+ID4gPiB0aHJl ZQo+ID4gPiA+IGRpZmZlcmVudCBwbGFjZXMgZm9yIHN0YXRpYywgREhDUCBvciBQUFAgb24gUkVE IHdoaWNoCj4gPiA+ID4gYWJzb2x1dGVseQo+ID4gPiA+IG1ha2VzIG5vIHNlbnNlLgo+ID4gPiA+ IFdlIGhhdmUgYSBDR0kgZmlsZSB0aGF0IGFsbG93cyB1c2VycyB0byBzZXQgYWx0ZXJuYXRpdmUg RE5TCj4gPiA+ID4gc2VydmVycwo+ID4gPiA+IGZvciBESENQCj4gPiA+ID4gd2hpY2ggd2UgY291 bGQgcHJvYmFibHkgdXNlIGFuZCBleHRlbmQgYW5kIHRoZW4gZHJvcCBhbGwgdGhlCj4gPiA+ID4g b3RoZXIKPiA+ID4gPiB0aGluZ3MuCj4gPiA+ID4gCj4gPiA+ID4gQW55b25lIHVwIGZvciBjb250 cmlidXRpbmcgdG8gdGhpcz8gTXkgc2NoZWR1bGUgaXMgYSBiaXQgdGlnaHQKPiA+ID4gPiByaWdo dAo+ID4gPiA+IG5vdywgYnV0IEkKPiA+ID4gPiB3b3VsZCBjZXJ0YWlubHkgYmUgaW50ZXJlc3Rl ZCBpbiB0aGlzLgo+ID4gPiA+IAo+ID4gPiA+IEJlc3QsCj4gPiA+ID4gLU1pY2hhZWwKPiA+ID4g PiAKPiA+ID4gPiA+IAo+ID4gPiA+ID4gUGF1bAo+ID4gPiA+ID4gCj4gPiA+IAo+ID4gPiBJJ20g YXZhaWxhYmxlIHRvIGV4cGVyaW1lbnQgYW5kIHRlc3QuIEkndmUgc2V0IHVwIGEgc2Vjb25kIEhE IGZvcgo+ID4gPiBib290aW5nIGFsdGVybmF0aXZlIGNvbmZpZ3VyYXRpb25zLiBJIHdpbGwgYXR0 ZW1wdCBhIG1pbmltYWwKPiA+ID4gdW5ib3VuZAo+ID4gPiBpbml0LmQgdXNpbmcgVExTLgo+ID4g Cj4gPiBDb29sLiBJIGd1ZXNzIGEgc3dpdGNoIGluIHRoZSBpbml0c2NyaXB0IHdvdWxkIGJlIGEg Z29vZCBzdGFydCB0bwo+ID4gdHVybgo+ID4gdGhlIHRscy11cHN0cmVhbTogeWVzIG9wdGlvbiBv bi4gTm90IHN1cmUgaWYgYW55IG1vcmUgYXJlIG5lZWRlZC4KPiA+IAo+ID4gPiBVbmZvcnR1bmF0 ZWx5LCBDR0kgaXNuJ3QgaW4gbXkgc2tpbGwgc2V0LiBEb2VzIGFueW9uZSBlbHNlIG91dAo+ID4g PiB0aGVyZQo+ID4gPiBoYXZlIGlucHV0Pwo+ID4gCj4gPiBTb21lIG9mIHRoZW0gYXJlIHF1aXRl IGNvcHkgYW5kIHBhc3RlLiBUaGlzIG9uZSB3aWxsIGp1c3QgZmV0Y2ggYQo+ID4gZmV3Cj4gPiBz ZXR0aW5ncyBmcm9tIHRoZSB1c2VyIGFuZCB3cml0ZSB0aGVtIHRvIGEgZmlsZS4gTWF5YmUgY2hl Y2sgdGhlCj4gPiBmaXJld2FsbCBvcHRpb25zIENHSSBmaWxlIGZvciBpbnNwaXJhdGlvbi4KPiA+ IAo+ID4gQmVzdCwKPiA+IC1NaWNoYWVsCj4gPiAKPiA+ID4gCj4gPiA+IFBhdWwKCi0tIApTdWJ1 cmJpYSBpcyB3aGVyZSB0aGUgZGV2ZWxvcGVyIGJ1bGxkb3plcyBvdXQgdGhlIHRyZWVzLCB0aGVu IG5hbWVzIHRoZQpzdHJlZXRzIGFmdGVyIHRoZW0uIC0tIEJpbGwgVmF1Z2hu ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-05-01 14:33 ` [Fwd: Re: request for info: unbound via https / tls] Paul Simmons @ 2018-05-01 14:40 ` Peter Müller 2018-05-01 17:16 ` Paul Simmons 2018-12-02 19:10 ` ummeegge 0 siblings, 2 replies; 28+ messages in thread From: Peter Müller @ 2018-05-01 14:40 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 552 bytes --] Hello, > > The unbound init and the cgi scripts use dig 9.11.3, which has no > native support for TLS. I'm trying to configure stunnel to act as MITM > so that dig can succeed. I hope to restrict unbound to port 853 for > listen and send, and use stunnel to listen on port 53 and forward to > 853. as far as I am aware, the knot-utils from CZ.NIC are capable of DNS over TLS. Maybe we should think about moving to them, or wait until bind-utils/dig are updated (not sure if we are running the latest version anyway). Best regards, Peter Müller [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 819 bytes --] ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-05-01 14:40 ` Peter Müller @ 2018-05-01 17:16 ` Paul Simmons 2018-05-03 16:03 ` Michael Tremer 2018-12-02 19:10 ` ummeegge 1 sibling, 1 reply; 28+ messages in thread From: Paul Simmons @ 2018-05-01 17:16 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 1015 bytes --] On Tue, 2018-05-01 at 16:40 +0200, Peter Müller wrote: > Hello, > > > > > The unbound init and the cgi scripts use dig 9.11.3, which has no > > native support for TLS. I'm trying to configure stunnel to act as > > MITM > > so that dig can succeed. I hope to restrict unbound to port 853 > > for > > listen and send, and use stunnel to listen on port 53 and forward > > to > > 853. > > as far as I am aware, the knot-utils from CZ.NIC are capable of > DNS over TLS. Maybe we should think about moving to them, or wait > until bind-utils/dig are updated (not sure if we are running the > latest > version anyway). > > Best regards, > Peter Müller > I don't mind continuing with unbound, as it seems to be in active development and is well documented. Based on my (failing) testing, I'm abandoning using stunnel, and will wait for a version of dig with native TLS support. Until then, I'm using https://gitlab.com/snippets/1706804 to get around my (only one available) ISP munging DNS. Best regards, Paul ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-05-01 17:16 ` Paul Simmons @ 2018-05-03 16:03 ` Michael Tremer 0 siblings, 0 replies; 28+ messages in thread From: Michael Tremer @ 2018-05-03 16:03 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 1580 bytes --] Hey, well I would actually like to get rid of as much of that shell stuff in that initscript as we can. This is just a bit too much testing and no matter how much we tune that will never be where it should be. I wrote a little blog post about this today: https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers There is more to come... Best, -Michael On Tue, 2018-05-01 at 12:16 -0500, Paul Simmons wrote: > On Tue, 2018-05-01 at 16:40 +0200, Peter Müller wrote: > > Hello, > > > > > > > > The unbound init and the cgi scripts use dig 9.11.3, which has no > > > native support for TLS. I'm trying to configure stunnel to act as > > > MITM > > > so that dig can succeed. I hope to restrict unbound to port 853 > > > for > > > listen and send, and use stunnel to listen on port 53 and forward > > > to > > > 853. > > > > as far as I am aware, the knot-utils from CZ.NIC are capable of > > DNS over TLS. Maybe we should think about moving to them, or wait > > until bind-utils/dig are updated (not sure if we are running the > > latest > > version anyway). > > > > Best regards, > > Peter Müller > > > > I don't mind continuing with unbound, as it seems to be in active > development and is well documented. > > Based on my (failing) testing, I'm abandoning using stunnel, and will > wait for a version of dig with native TLS support. > > Until then, I'm using https://gitlab.com/snippets/1706804 to get around > my (only one available) ISP munging DNS. > > Best regards, > Paul ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-05-01 14:40 ` Peter Müller 2018-05-01 17:16 ` Paul Simmons @ 2018-12-02 19:10 ` ummeegge 2018-12-02 20:23 ` Paul Simmons 1 sibling, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-02 19:10 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2260 bytes --] Hi all, have build knot but needed also # Begin knot deps lfsmake2 libmaxminddb lfsmake2 libedit lfsmake2 userspace lfsmake2 knot # End knot to build kdig properly. By the usage of e.g. kdig -d @145.100.185.18 +tls-host=dnsovertls3.sinodun.com ipfire.org i get an ;; DEBUG: Querying for owner(ipfire.org.), class(1), type(1), server(145.100.185.18), port(853), protocol(TCP) ;; WARNING: TLS, failed to import system certificates (GNUTLS_E_UNIMPLEMENTED_FEATURE) ;; WARNING: failed to query server 145.100.185.18(a)853(TCP) . So it seems that 'gnutls_x509_trust_list_add_trust_file{dir}()' is not able to find the system certificates. May a --with-default-trust-store-dir=/etc/ssl/certs in configure of GnuTLS might help there... As a beside one, some tests causing DoT happens in here --> https://forum.ipfire.org/viewtopic.php?f=50&t=21954 whereby Dot runs currently without problems but the focus is in there relies on the initscript of unbound to make DoT usable over on IPFire. Have compiled meanwhile also ldns whereby drill is also a possibility for other views and there is also a DoT patch for ldns --> https://portal.sinodun.com/stash/projects/TDNS/repos/dns-over-tls_patches/browse/ldns-1.6.17_dns-over-tls.patch https://tools.ietf.org/html/draft-ietf-dprive-dns-over-tls-09#section-8.2 but the versions are outdated even unbound needs also to be patched. May NLnet Labs did there already something to support that but i haven´t found it yet. Some infos from here. Best, Erik Am Dienstag, den 01.05.2018, 16:40 +0200 schrieb Peter Müller: > Hello, > > > > > The unbound init and the cgi scripts use dig 9.11.3, which has no > > native support for TLS. I'm trying to configure stunnel to act as > > MITM > > so that dig can succeed. I hope to restrict unbound to port 853 > > for > > listen and send, and use stunnel to listen on port 53 and forward > > to > > 853. > > as far as I am aware, the knot-utils from CZ.NIC are capable of > DNS over TLS. Maybe we should think about moving to them, or wait > until bind-utils/dig are updated (not sure if we are running the > latest > version anyway). > > Best regards, > Peter Müller > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-02 19:10 ` ummeegge @ 2018-12-02 20:23 ` Paul Simmons 2018-12-04 14:01 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Paul Simmons @ 2018-12-02 20:23 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2814 bytes --] On Sun, 2018-12-02 at 20:10 +0100, ummeegge wrote: > Hi all, > have build knot but needed also > > # Begin knot deps > lfsmake2 libmaxminddb > lfsmake2 libedit > lfsmake2 userspace > lfsmake2 knot > # End knot > > to build kdig properly. By the usage of e.g. > > kdig -d @145.100.185.18 +tls-host=dnsovertls3.sinodun.com ipfire.org > > i get an > > ;; DEBUG: Querying for owner(ipfire.org.), class(1), type(1), > server(145.100.185.18), port(853), protocol(TCP) > ;; WARNING: TLS, failed to import system certificates > (GNUTLS_E_UNIMPLEMENTED_FEATURE) > ;; WARNING: failed to query server 145.100.185.18(a)853(TCP) > > . So it seems that 'gnutls_x509_trust_list_add_trust_file{dir}()' is > not able to find the system certificates. May a > > --with-default-trust-store-dir=/etc/ssl/certs > > in configure of GnuTLS might help there... > > As a beside one, some tests causing DoT happens in here --> > https://forum.ipfire.org/viewtopic.php?f=50&t=21954 > > whereby Dot runs currently without problems but the focus is in there > relies > on the initscript of unbound to make DoT usable over on IPFire. > > Have compiled meanwhile also ldns whereby drill is also a > possibility > for other views and there is also a DoT patch for ldns --> > > https://portal.sinodun.com/stash/projects/TDNS/repos/dns-over-tls_patches/browse/ldns-1.6.17_dns-over-tls.patch > > https://tools.ietf.org/html/draft-ietf-dprive-dns-over-tls-09#section-8.2 > > but the versions are outdated even unbound needs also to be patched. > May NLnet Labs did there already something to support that but i > haven´t found it yet. > > Some infos from here. > > Best, > > Erik > > > Am Dienstag, den 01.05.2018, 16:40 +0200 schrieb Peter Müller: > > Hello, > > > > > > > > The unbound init and the cgi scripts use dig 9.11.3, which has no > > > native support for TLS. I'm trying to configure stunnel to act > > > as > > > MITM > > > so that dig can succeed. I hope to restrict unbound to port 853 > > > for > > > listen and send, and use stunnel to listen on port 53 and forward > > > to > > > 853. > > > > as far as I am aware, the knot-utils from CZ.NIC are capable of > > DNS over TLS. Maybe we should think about moving to them, or wait > > until bind-utils/dig are updated (not sure if we are running the > > latest > > version anyway). > > > > Best regards, > > Peter Müller > > > > Hello, Erik. My "admin-foo" has weakened over the years, and my "developer-foo" is even worse. Thank you for pursuing DoT on IPFire, as I hope it will circumvent my ISPs mangling of DNS queries, and allow easier upgrade to current releases. Best regards, Paul -- I would if I could, but I can't so I won't. ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-02 20:23 ` Paul Simmons @ 2018-12-04 14:01 ` ummeegge 2018-12-04 16:19 ` Peter Müller 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-04 14:01 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 930 bytes --] Hi Paul, and thanks for your positive feedback. Wrote now all togehter for better overview but also for better overview of open questions. You can find in here --> https://gitlab.com/ummeegge/dot-for-ipfire the actual state + a simple in- uninstaller helper, i hoped it is then may also a little easier for people without "developer|admin-foo" to go for some testing rounds ;-). ldns (which includes drill) can be found in here --> https://people.ipfire.org/~ummeegge/ldns/ . Since this topic here is also an older one, i´ am not sure if there is interest anymore in DoT or DoH. Let´s see. Best, Erik > > Hello, Erik. My "admin-foo" has weakened over the years, and my > "developer-foo" is even worse. > > Thank you for pursuing DoT on IPFire, as I hope it will circumvent my > ISPs mangling of DNS queries, and allow easier upgrade to current > releases. > > Best regards, > Paul ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-04 14:01 ` ummeegge @ 2018-12-04 16:19 ` Peter Müller 2018-12-05 7:35 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Peter Müller @ 2018-12-04 16:19 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 1379 bytes --] Hello Erik, > Hi Paul, > and thanks for your positive feedback. > Wrote now all togehter for better overview but also for better overview > of open questions. > > You can find in here --> https://gitlab.com/ummeegge/dot-for-ipfire > the actual state + a simple in- uninstaller helper, i hoped it is > then may also a little easier for people without "developer|admin-foo" to go > for some testing rounds ;-). > > ldns (which includes drill) can be found in here --> > https://people.ipfire.org/~ummeegge/ldns/ . > > Since this topic here is also an older one, i´ am not sure if there is interest anymore in DoT or DoH. I am pretty sure there is still huge interest in adding DoT support to IPFire - in my point of view, yesterdays telephone conference showed this again. Our problem seems to be a lack of coordination: You are developing pretty much (OpenSSL 1.1.1 comes to my mind), which is simply great. I can only speak for myself here, but do not have any overview about what these are in detail. :-) Maybe joining a telco might help (nudge, nudge). :-) Thanks, and best regards, Peter Müller > > Let´s see. > > Best, > > Erik > -- Microsoft DNS service terminates abnormally when it recieves a response to a DNS query that was never made. Fix Information: Run your DNS service on a different platform. -- bugtraq ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-04 16:19 ` Peter Müller @ 2018-12-05 7:35 ` ummeegge 2018-12-09 20:08 ` ummeegge 2018-12-10 0:21 ` Michael Tremer 0 siblings, 2 replies; 28+ messages in thread From: ummeegge @ 2018-12-05 7:35 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 1363 bytes --] Hello Peter, and thanks for your response. Am Dienstag, den 04.12.2018, 17:19 +0100 schrieb Peter Müller: > I am pretty sure there is still huge interest in adding DoT support > to > IPFire - in my point of view, yesterdays telephone conference showed > this again. > Good to here. Wanted to be part of the last conference but my jobsite have had other plans. > Our problem seems to be a lack of coordination: You are developing > pretty much (OpenSSL 1.1.1 comes to my mind), which is simply great. I do not really see a lack of coordination here or are somebody else working on DoT currently ? OpenSSL-1.1.1 might be a good/important addition to DoT --> https://tools.ietf.org/html/draft-ietf-tls-sni-encryption-02 --> https://blog.cloudflare.com/encrypted-sni/ which brings also some other interesting side affects --> https://www.dnsthingy.com/2018/10/encrypted-sni-death-blow-to-transparent-filtering/ ... > I can only speak for myself here, but do not have any overview about > what these are in detail. :-) > Not 100% sure what you mean, are you mean an overview of other projects which i am currently working one ? > Maybe joining a telco might help (nudge, nudge). :-) > I hear you :D . Looking forward for more_action/more_people or in general for more response/help in this topic. Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-05 7:35 ` ummeegge @ 2018-12-09 20:08 ` ummeegge 2018-12-10 0:21 ` Michael Tremer 2018-12-10 0:21 ` Michael Tremer 1 sibling, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-09 20:08 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 133 bytes --] Hi all, some news in this topic can be found in here --> https://forum.ipfire.org/viewtopic.php?f=50&p=120997#p120997 Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-09 20:08 ` ummeegge @ 2018-12-10 0:21 ` Michael Tremer 2018-12-10 11:30 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-10 0:21 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 405 bytes --] I did not understand what the news is here, but please try to keep the conversation on the list when it has started there. I do not regularly read the forums. -Michael > On 9 Dec 2018, at 20:08, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hi all, > some news in this topic can be found in here --> > https://forum.ipfire.org/viewtopic.php?f=50&p=120997#p120997 > > Best, > > Erik > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 0:21 ` Michael Tremer @ 2018-12-10 11:30 ` ummeegge 0 siblings, 0 replies; 28+ messages in thread From: ummeegge @ 2018-12-10 11:30 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2453 bytes --] Hi Michael, Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer: > I did not understand what the news is here, the main news for me was that i´ ve build knot (kdig) and a deeper look into the whole DNS-over-TLS subject and a debugging in general of DoT is now better possible. The next news was that i wrote a script which checks the configured DoT servers via kdig for a better overview which servers are reliable. Since i do not use Quad9 nor Cloudflair which are currently the only one to my knowledge that are not outlined as not experimental) --> https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Public+Resolvers public resolvers i wanted to check what´s going on with all the experimental ones --> https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers#DNSPrivacyTestServers-DoTservers therefor this step was important for me and i decided to share it here with you. Have update also the DoT configuration file to now 12 DNS test servers which worked now since ~ 2 weeks without problems. Needed also to throw some others out which causes problems since some certificate where not trustworthy or DNSSEC validation doesn´t worked. May you ask yourself why on earth 12 DNS servers ? Well, another testing field for me is not only encryption in that topic but also randomization --> https://www.monperrus.net/martin/randomization-encryption-dns-requests --> https://www.ctrl.blog/entry/kresd-random-dns-forwarding which unbound offers via 'rrset-roundrobin: yes' as a default value on IPFire but along my testings i could figure out that it only works with DoT not with regular DNS, for reference test see here --> https://forum.ipfire.org/viewtopic.php?f=6&t=21866#p120276 This are currently my main news, but there is more which i wrote in the forum but also on Gitlab in the README. > but please try to keep the conversation on the list when it has > started there. I do not regularly read the forums. Yes i know and will do this too but as ever i try to invite the community also via forum to go for testings/sharing_information which, also as usual, do not works very well. Best, Erik > > -Michael > > > On 9 Dec 2018, at 20:08, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > Hi all, > > some news in this topic can be found in here --> > > https://forum.ipfire.org/viewtopic.php?f=50&p=120997#p120997 > > > > Best, > > > > Erik > > > > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-05 7:35 ` ummeegge 2018-12-09 20:08 ` ummeegge @ 2018-12-10 0:21 ` Michael Tremer 2018-12-10 12:14 ` ummeegge 1 sibling, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-10 0:21 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2312 bytes --] Hi, > On 5 Dec 2018, at 07:35, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hello Peter, > and thanks for your response. > > Am Dienstag, den 04.12.2018, 17:19 +0100 schrieb Peter Müller: >> I am pretty sure there is still huge interest in adding DoT support >> to >> IPFire - in my point of view, yesterdays telephone conference showed >> this again. >> > Good to here. Wanted to be part of the last conference but my jobsite > have had other plans. > >> Our problem seems to be a lack of coordination: You are developing >> pretty much (OpenSSL 1.1.1 comes to my mind), which is simply great. > I do not really see a lack of coordination here or are somebody else > working on DoT currently ? > OpenSSL-1.1.1 might be a good/important > addition to DoT --> > > https://tools.ietf.org/html/draft-ietf-tls-sni-encryption-02 > --> https://blog.cloudflare.com/encrypted-sni/ which brings also some > other interesting side affects --> > https://www.dnsthingy.com/2018/10/encrypted-sni-death-blow-to-transparent-filtering/ > ... > >> I can only speak for myself here, but do not have any overview about >> what these are in detail. :-) >> > Not 100% sure what you mean, are you mean an overview of other projects > which i am currently working one ? > > >> Maybe joining a telco might help (nudge, nudge). :-) >> > I hear you :D . > Looking forward for more_action/more_people or in general for more > response/help in this topic. I am not sure what you are looking for. But I just wanted to say that I am following this conversation. So far I think that there are indeed many people interested in DoT. However, I have not received any feedback on what I was mailing before. I think what is best now is to get this into small patches. What needs to be done to get this UI ready so that people can add those DNS servers? What will the default behaviour be? How will we make sure that the system does not fall back (to unauthenticated DNS)? I think that we can leave OpenSSL 1.1.1 aside for this for now, because it works perfectly fine with TLS 1.2. We should not mix multiple things together when they have no strict dependency (although I am really looking forward to see TLS 1.3 in IPFire soon). Best, -Michael > Best, > > Erik > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 0:21 ` Michael Tremer @ 2018-12-10 12:14 ` ummeegge 2018-12-10 12:32 ` ummeegge ` (2 more replies) 0 siblings, 3 replies; 28+ messages in thread From: ummeegge @ 2018-12-10 12:14 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2702 bytes --] Hi Michael, Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer: > I am not sure what you are looking for. Mainly for testing people which take also a look over the changes in unbound initscript. Since the 'update_forwarders()' function from unbound init will currently not be used if custom forwarders are in usage. 'update_forwarders()' includes really a lot of other functions and it was/is not that easy to check for all possible side affects if this function will be bypassed and substituded by another one (cue: DNSSEC, EDNS, ...). All changes causing the unbound initscript can be found in here --> https://gitlab.com/ummeegge/dot-for-ipfire/commits/master/unbound . Another point i am currently looking for is the question, if unbound is the best possibility for DoT ? If you take look into the current implementation status --> https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status unbound misses also some other DoT related features. Am building currently GetDNS and Stubby just to get there also a better inside of the differences. Also, integrating DoT into webuserinterface is, as before mentioned in here, a point. Should DoT become it´s own one, or is it a complete new WUI menu point worth ? In my humble opinion this DoT topic is still pretty much in a testing phase not only speaking for myself but also looking around and finding only two (may three) stable DoT providers speaks, i think, also a little for itself. > But I just wanted to say that I am following this conversation. That´s great. > > So far I think that there are indeed many people interested in DoT. > However, I have not received any feedback on what I was mailing > before. > I hope some feedback comes around also since i am currently testing it for a couple of weeks now and posted the results/code_changes in the forum and some also in here. > I think what is best now is to get this into small patches. What > needs to be done to get this UI ready so that people can add those > DNS servers? What will the default behaviour be? How will we make > sure that the system does not fall back (to unauthenticated DNS)? > That´s the fundamental question, please see the above statements. > I think that we can leave OpenSSL 1.1.1 aside for this for now, > because it works perfectly fine with TLS 1.2. We should not mix > multiple things together when they have no strict dependency > (although I am really looking forward to see TLS 1.3 in IPFire soon). > OpenSSL-1.1.1 and TLS 1.3 fits perfectly into this topic and i hope i can install today the new OpenSSL and to test it in my productive environment. > Best, > -Michael > > > Best, > > > > Erik > > > > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 12:14 ` ummeegge @ 2018-12-10 12:32 ` ummeegge 2018-12-10 13:26 ` Michael Tremer 2018-12-10 13:37 ` Michael Tremer 2018-12-11 2:01 ` Paul Simmons 2 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-10 12:32 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 601 bytes --] A question, what happens with DoT on Lightningwirelabs --> https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers ? I get there an $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls-host="ns1.lightningwirelabs.com" google.com; ;; DEBUG: Querying for owner(google.com.), class(1), type(1), server(81.3.27.54), port(853), protocol(TCP) ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca-bundle.crt' ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) . Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 12:32 ` ummeegge @ 2018-12-10 13:26 ` Michael Tremer 2018-12-10 14:37 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-10 13:26 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 946 bytes --] Hey, Thanks for reporting. > On 10 Dec 2018, at 12:32, ummeegge <ummeegge(a)ipfire.org> wrote: > > A question, > what happens with DoT on Lightningwirelabs --> > https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers ? > I get there an > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls-host="ns1.lightningwirelabs.com" google.com; > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), server(81.3.27.54), port(853), protocol(TCP) > ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca-bundle.crt' > ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) > ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) I recently made a change which caused that unbound didn’t listen on the TLS port any more. I fixed that now. The correct host name for that server is rec1.dns.lightningwirelabs.com. -Michael > . > > Best, > > Erik > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 13:26 ` Michael Tremer @ 2018-12-10 14:37 ` ummeegge 2018-12-11 19:22 ` Michael Tremer 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-10 14:37 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2125 bytes --] Great that you looked over it, have tested it again and the kdig report differs which looks now like this: ;; DEBUG: Querying for owner(google.com.), class(1), type(1), server(81.3.27.54), port(853), protocol(TCP) ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- bundle.crt' ;; DEBUG: TLS, received certificate hierarchy: ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com ;; DEBUG: SHA-256 PIN: ZayzRhKLRWLL7v9QC0uEJEMomE572oNUuF4ocAxDQ7E= ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 ;; DEBUG: SHA-256 PIN: YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= ;; DEBUG: TLS, skipping certificate PIN check ;; DEBUG: TLS, The certificate is NOT trusted. The certificate requires the server to include an OCSP status in its response, but the OCSP status is missing. ;; WARNING: TLS, handshake failed (Error in the certificate.) ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) Exit status: 0 May this is helpful for you. Best, Erik Am Montag, den 10.12.2018, 13:26 +0000 schrieb Michael Tremer: > Hey, > > Thanks for reporting. > > > On 10 Dec 2018, at 12:32, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > A question, > > what happens with DoT on Lightningwirelabs --> > > https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers > > ? > > I get there an > > > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls- > > host="ns1.lightningwirelabs.com" google.com; > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > > server(81.3.27.54), port(853), protocol(TCP) > > ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- > > bundle.crt' > > ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) > > ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) > > I recently made a change which caused that unbound didn’t listen on > the TLS port any more. > > I fixed that now. > > The correct host name for that server is > rec1.dns.lightningwirelabs.com. > > -Michael > > > . > > > > Best, > > > > Erik > > > > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 14:37 ` ummeegge @ 2018-12-11 19:22 ` Michael Tremer 2018-12-11 19:43 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-11 19:22 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2387 bytes --] Hey, Could you try that again? I removed the OCSP must-staple flag from the certificate. -Michael > On 10 Dec 2018, at 14:37, ummeegge <ummeegge(a)ipfire.org> wrote: > > Great that you looked over it, have tested it again and the kdig report > differs which looks now like this: > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > server(81.3.27.54), port(853), protocol(TCP) > ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- > bundle.crt' > ;; DEBUG: TLS, received certificate hierarchy: > ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com > ;; DEBUG: SHA-256 PIN: > ZayzRhKLRWLL7v9QC0uEJEMomE572oNUuF4ocAxDQ7E= > ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 > ;; DEBUG: SHA-256 PIN: > YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= > ;; DEBUG: TLS, skipping certificate PIN check > ;; DEBUG: TLS, The certificate is NOT trusted. The certificate requires > the server to include an OCSP status in its response, but the OCSP > status is missing. > ;; WARNING: TLS, handshake failed (Error in the certificate.) > ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) > > Exit status: 0 > > May this is helpful for you. > > Best, > > Erik > > Am Montag, den 10.12.2018, 13:26 +0000 schrieb Michael Tremer: >> Hey, >> >> Thanks for reporting. >> >>> On 10 Dec 2018, at 12:32, ummeegge <ummeegge(a)ipfire.org> wrote: >>> >>> A question, >>> what happens with DoT on Lightningwirelabs --> >>> > https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers >>> ? >>> I get there an >>> >>> $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls- >>> host="ns1.lightningwirelabs.com" google.com; >>> ;; DEBUG: Querying for owner(google.com.), class(1), type(1), >>> server(81.3.27.54), port(853), protocol(TCP) >>> ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- >>> bundle.crt' >>> ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) >>> ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) >> >> I recently made a change which caused that unbound didn’t listen on >> the TLS port any more. >> >> I fixed that now. >> >> The correct host name for that server is >> rec1.dns.lightningwirelabs.com. >> >> -Michael >> >>> . >>> >>> Best, >>> >>> Erik >>> >> >> > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-11 19:22 ` Michael Tremer @ 2018-12-11 19:43 ` ummeegge 2018-12-11 19:54 ` Michael Tremer 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-11 19:43 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 4540 bytes --] Hi Michael, tried that now with this one --> https://people.ipfire.org/~ummeegge/screenshoots/dns-over-tls_wui.png ... the HTML formatting kills me :D ... and it looks now good: $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls-host=rec1.dns.lightningwirelabs.com google.com ;; DEBUG: Querying for owner(google.com.), class(1), type(1), server(81.3.27.54), port(853), protocol(TCP) ;; DEBUG: TLS, imported 129 certificates from '/etc/ssl/certs/ca-bundle.crt' ;; DEBUG: TLS, received certificate hierarchy: ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com ;; DEBUG: SHA-256 PIN: pOvVkJSj6rWNPM0vR3hoJr/21kZI6TfImhowIEdcEUQ= ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 ;; DEBUG: SHA-256 PIN: YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= ;; DEBUG: TLS, skipping certificate PIN check ;; DEBUG: TLS, The certificate is trusted. ;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20-POLY1305) ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1349 ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 1 ;; EDNS PSEUDOSECTION: ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR ;; QUESTION SECTION: ;; google.com. IN A ;; ANSWER SECTION: google.com. 151 IN A 216.58.208.46 ;; Received 55 B ;; Time 2018-12-11 20:30:29 CET ;; From 81.3.27.54(a)853(TCP) in 25.2 ms Great, will update my dot.conf. As a beneath one, try it currently with a seperat CGI to have a better overview. Patched now as you suggested the 'write_forward_conf()' function, needed to disable nevertheless update_forwarder() function in initscript if forward.conf should be used ... (there is more) Come back if things are cleaned/cleared up a little more but also better tested. Best, Erik Am Dienstag, den 11.12.2018, 19:22 +0000 schrieb Michael Tremer: > Hey, > > Could you try that again? I removed the OCSP must-staple flag from > the certificate. > > -Michael > > > On 10 Dec 2018, at 14:37, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > Great that you looked over it, have tested it again and the kdig > > report > > differs which looks now like this: > > > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > > server(81.3.27.54), port(853), protocol(TCP) > > ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- > > bundle.crt' > > ;; DEBUG: TLS, received certificate hierarchy: > > ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com > > ;; DEBUG: SHA-256 PIN: > > ZayzRhKLRWLL7v9QC0uEJEMomE572oNUuF4ocAxDQ7E= > > ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 > > ;; DEBUG: SHA-256 PIN: > > YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= > > ;; DEBUG: TLS, skipping certificate PIN check > > ;; DEBUG: TLS, The certificate is NOT trusted. The certificate > > requires > > the server to include an OCSP status in its response, but the OCSP > > status is missing. > > ;; WARNING: TLS, handshake failed (Error in the certificate.) > > ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) > > > > Exit status: 0 > > > > May this is helpful for you. > > > > Best, > > > > Erik > > > > Am Montag, den 10.12.2018, 13:26 +0000 schrieb Michael Tremer: > > > Hey, > > > > > > Thanks for reporting. > > > > > > > On 10 Dec 2018, at 12:32, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > > > > > A question, > > > > what happens with DoT on Lightningwirelabs --> > > > > > > > > https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers > > > > ? > > > > I get there an > > > > > > > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt > > > > +tls- > > > > host="ns1.lightningwirelabs.com" google.com; > > > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > > > > server(81.3.27.54), port(853), protocol(TCP) > > > > ;; DEBUG: TLS, imported 128 certificates from > > > > '/etc/ssl/certs/ca- > > > > bundle.crt' > > > > ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) > > > > ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) > > > > > > I recently made a change which caused that unbound didn’t listen > > > on > > > the TLS port any more. > > > > > > I fixed that now. > > > > > > The correct host name for that server is > > > rec1.dns.lightningwirelabs.com. > > > > > > -Michael > > > > > > > . > > > > > > > > Best, > > > > > > > > Erik > > > > > > > > > > > > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-11 19:43 ` ummeegge @ 2018-12-11 19:54 ` Michael Tremer 2018-12-12 13:42 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-11 19:54 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 5555 bytes --] Hey, On 11 Dec 2018, at 19:43, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hi Michael, > tried that now with this one --> > https://people.ipfire.org/~ummeegge/screenshoots/dns-over-tls_wui.png This looks good, but under no circumstances should there be *another* place where to configure DNS servers. We already have three. They need to be unified to one. > > ... the HTML formatting kills me :D ... > > and it looks now good: > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls-host=rec1.dns.lightningwirelabs.com google.com > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), server(81.3.27.54), port(853), protocol(TCP) > ;; DEBUG: TLS, imported 129 certificates from '/etc/ssl/certs/ca-bundle.crt' > ;; DEBUG: TLS, received certificate hierarchy: > ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com > ;; DEBUG: SHA-256 PIN: pOvVkJSj6rWNPM0vR3hoJr/21kZI6TfImhowIEdcEUQ= > ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 > ;; DEBUG: SHA-256 PIN: YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= > ;; DEBUG: TLS, skipping certificate PIN check > ;; DEBUG: TLS, The certificate is trusted. > ;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20-POLY1305) > ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1349 > ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 1 > > ;; EDNS PSEUDOSECTION: > ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR > > ;; QUESTION SECTION: > ;; google.com. IN A > > ;; ANSWER SECTION: > google.com. 151 IN A 216.58.208.46 > > ;; Received 55 B > ;; Time 2018-12-11 20:30:29 CET > ;; From 81.3.27.54(a)853(TCP) in 25.2 ms 25ms is actually quite good! > > Great, will update my dot.conf. > > As a beneath one, try it currently with a seperat CGI to have a better overview. > Patched now as you suggested the 'write_forward_conf()' function, needed to disable > nevertheless update_forwarder() function in initscript if forward.conf should be used > ... (there is more) > As we talked about before, I think that we can skip the DNSSEC tests entirely. They are more damaging than anything else. That means that we should probably be looking at having a switch somewhere that enables DNS-over-TLS first and then all configured name servers are just used without further tests. In the default configuration that cannot be the case because of the problems we are trying to overcome by this script. But Erik, please let’s find a strategy first because everything is being implemented. I am absolutely happy that you are doing such good work here, but keep in mind that this needs to be integrated into IPFire in a slow and peer-reviewed way. -Michael > Come back if things are cleaned/cleared up a little more but also better tested. > > Best, > > Erik > > > > Am Dienstag, den 11.12.2018, 19:22 +0000 schrieb Michael Tremer: >> Hey, >> >> Could you try that again? I removed the OCSP must-staple flag from >> the certificate. >> >> -Michael >> >>> On 10 Dec 2018, at 14:37, ummeegge <ummeegge(a)ipfire.org> wrote: >>> >>> Great that you looked over it, have tested it again and the kdig >>> report >>> differs which looks now like this: >>> >>> ;; DEBUG: Querying for owner(google.com.), class(1), type(1), >>> server(81.3.27.54), port(853), protocol(TCP) >>> ;; DEBUG: TLS, imported 128 certificates from '/etc/ssl/certs/ca- >>> bundle.crt' >>> ;; DEBUG: TLS, received certificate hierarchy: >>> ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com >>> ;; DEBUG: SHA-256 PIN: >>> ZayzRhKLRWLL7v9QC0uEJEMomE572oNUuF4ocAxDQ7E= >>> ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 >>> ;; DEBUG: SHA-256 PIN: >>> YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= >>> ;; DEBUG: TLS, skipping certificate PIN check >>> ;; DEBUG: TLS, The certificate is NOT trusted. The certificate >>> requires >>> the server to include an OCSP status in its response, but the OCSP >>> status is missing. >>> ;; WARNING: TLS, handshake failed (Error in the certificate.) >>> ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) >>> >>> Exit status: 0 >>> >>> May this is helpful for you. >>> >>> Best, >>> >>> Erik >>> >>> Am Montag, den 10.12.2018, 13:26 +0000 schrieb Michael Tremer: >>>> Hey, >>>> >>>> Thanks for reporting. >>>> >>>>> On 10 Dec 2018, at 12:32, ummeegge <ummeegge(a)ipfire.org> wrote: >>>>> >>>>> A question, >>>>> what happens with DoT on Lightningwirelabs --> >>>>> >>> >>> > https://www.lightningwirelabs.com/2018/05/03/dns-over-tls-now-available-on-our-resolvers >>>>> ? >>>>> I get there an >>>>> >>>>> $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt >>>>> +tls- >>>>> host="ns1.lightningwirelabs.com" google.com; >>>>> ;; DEBUG: Querying for owner(google.com.), class(1), type(1), >>>>> server(81.3.27.54), port(853), protocol(TCP) >>>>> ;; DEBUG: TLS, imported 128 certificates from >>>>> '/etc/ssl/certs/ca- >>>>> bundle.crt' >>>>> ;; WARNING: can't connect to 81.3.27.54(a)853(TCP) >>>>> ;; WARNING: failed to query server 81.3.27.54(a)853(TCP) >>>> >>>> I recently made a change which caused that unbound didn’t listen >>>> on >>>> the TLS port any more. >>>> >>>> I fixed that now. >>>> >>>> The correct host name for that server is >>>> rec1.dns.lightningwirelabs.com. >>>> >>>> -Michael >>>> >>>>> . >>>>> >>>>> Best, >>>>> >>>>> Erik >>>>> >>>> >>>> >> >> > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-11 19:54 ` Michael Tremer @ 2018-12-12 13:42 ` ummeegge 2018-12-12 15:25 ` Michael Tremer 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-12 13:42 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 5693 bytes --] Hi Michael, Am Dienstag, den 11.12.2018, 19:54 +0000 schrieb Michael Tremer: > Hey, > > On 11 Dec 2018, at 19:43, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > Hi Michael, > > tried that now with this one --> > > https://people.ipfire.org/~ummeegge/screenshoots/dns-over-tls_wui.png > > This looks good, but under no circumstances should there be *another* > place where to configure DNS servers. Sure. I need to check for myself how this can be accomplished so i take it step-by-step and with a clear CGI it is simply easier for me. > We already have three. They need to be unified to one. You mean dns.cgi and dnsforward.cgi ? > > > > > ... the HTML formatting kills me :D ... > > > > and it looks now good: > > > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls- > > host=rec1.dns.lightningwirelabs.com google.com > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > > server(81.3.27.54), port(853), protocol(TCP) > > ;; DEBUG: TLS, imported 129 certificates from '/etc/ssl/certs/ca- > > bundle.crt' > > ;; DEBUG: TLS, received certificate hierarchy: > > ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com > > ;; DEBUG: SHA-256 PIN: > > pOvVkJSj6rWNPM0vR3hoJr/21kZI6TfImhowIEdcEUQ= > > ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 > > ;; DEBUG: SHA-256 PIN: > > YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= > > ;; DEBUG: TLS, skipping certificate PIN check > > ;; DEBUG: TLS, The certificate is trusted. > > ;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20-POLY1305) > > ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1349 > > ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: > > 1 > > > > ;; EDNS PSEUDOSECTION: > > ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR > > > > ;; QUESTION SECTION: > > ;; google.com. IN A > > > > ;; ANSWER SECTION: > > google.com. 151 IN A 216.58.208.46 > > > > ;; Received 55 B > > ;; Time 2018-12-11 20:30:29 CET > > ;; From 81.3.27.54(a)853(TCP) in 25.2 ms > > 25ms is actually quite good! Yes, i think so. > > > > > Great, will update my dot.conf. > > > > As a beneath one, try it currently with a seperat CGI to have a > > better overview. > > Patched now as you suggested the 'write_forward_conf()' function, > > needed to disable > > nevertheless update_forwarder() function in initscript if > > forward.conf should be used > > ... (there is more) > > > > As we talked about before, I think that we can skip the DNSSEC tests > entirely. They are more damaging than anything else. Yes indeed, i think update_forwarders disables also any forwarder via unbound-control. > That means that we should probably be looking at having a switch > somewhere that enables DNS-over-TLS first and then all configured > name servers are just used without further tests. Have tried it now in this way --> https://git.ipfire.org/?p=ipfire-2.x.git;a=blob;f=src/initscripts/system/unbound;h=cc46c33c9425cc85d95b1d7412a9db3e146fea4b;hb=refs/heads/next#l154 . If unbound init finds an 'on' (enabled) in tlsconfig (which will be produced by CGI), it doesn´t execute update_forwarders. Am currently not sure if we need possibly the same for dnsforward config. Have tested it with a dummy entry but an 'unbound-control list_forwarders' shows nothing. If there is no entry or everything is 'off' unbound uses the old DNS servers configured via setup. > In the default configuration that cannot be the case because of the > problems we are trying to overcome by this script. Isn´t forward.conf not a good place for this ? > > But Erik, please let’s find a strategy first because everything is > being implemented. Am happy with this but i really need to know first what´s happen in the existing stuff, also i need to test for myself which ways may be possible to overcome side affects. I need there also some new knowledge causing the whole DNS/unbound thing but also insides how all that has already been implemented. In here --> https://git.ipfire.org/?p=people/ummeegge/ipfire-2.x.git;a=commit;h=90e45d849e5fa185e4dcf83844e85d68474a09f5 a first and also better tested version of DoT can be found whereby i am happy if someone comes around for some testings/enhancements. Merging all DNS CGI´s can be one of the following parts (not sure if i´ am the right one for this) but i need a working solution to see how the system is in harmony with all that. Also the dnsforwarding.cgi is in my humble opinion currently not working or i did there really something wrong. What strategy would you prefer ? > I am absolutely happy that you are doing such good work here, but > keep in mind that this needs to be integrated into IPFire in a slow > and peer-reviewed way. Need to think about how we can split things here. Do you have some ideas ? Another thing i have in account is the QNAME minimisation --> https://tools.ietf.org/html/rfc7816 even in unbound.conf 'qname-minimisation: yes' is active it didn´t worked for me: $ dig txt qnamemintest.internet.nl +short a.b.qnamemin-test.internet.nl. "NO - QNAME minimisation is NOT enabled on your resolver :(" needed to add also qname-minimisation-strict: yes harden-below-nxdomain: yes at earlier tests in my local.d conf to get an a.b.qnamemin-test.internet.nl. "HOORAY - QNAME minimisation is enabled on your resolver :)!" . Should we extend unbound.conf or should i add this one in forward.conf if DoT is active ? Or is this may not wanted ? Some thoughts/news from here. Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-12 13:42 ` ummeegge @ 2018-12-12 15:25 ` Michael Tremer 2018-12-12 17:44 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: Michael Tremer @ 2018-12-12 15:25 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 7868 bytes --] Hey, > On 12 Dec 2018, at 13:42, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hi Michael, > > Am Dienstag, den 11.12.2018, 19:54 +0000 schrieb Michael Tremer: >> Hey, >> >> On 11 Dec 2018, at 19:43, ummeegge <ummeegge(a)ipfire.org> wrote: >>> >>> Hi Michael, >>> tried that now with this one --> >>> > https://people.ipfire.org/~ummeegge/screenshoots/dns-over-tls_wui.png >> >> This looks good, but under no circumstances should there be *another* >> place where to configure DNS servers. > Sure. I need to check for myself how this can be accomplished so i take > it step-by-step and with a clear CGI it is simply easier for me. > > >> We already have three. They need to be unified to one. > You mean dns.cgi and dnsforward.cgi ? No. We have the following places where users can configure their DNS servers: For RED = STATIC: setup For RED = DHCP: dns.cgi For RED = PPP: The PPP profile It can be argued that it makes sense to have different DNS servers in place for each PPP profile (I do not think that this has any users at all. Either you use your ISP’s DNS or not). But overall it is confusing and also quite complicated in the code that we are reading the DNS servers from so many different places all the time. This needs to be simplified. There is a ticket for it since 2015: https://bugzilla.ipfire.org/show_bug.cgi?id=10886 > >> >>> >>> ... the HTML formatting kills me :D ... >>> >>> and it looks now good: >>> >>> $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt +tls- >>> host=rec1.dns.lightningwirelabs.com google.com >>> ;; DEBUG: Querying for owner(google.com.), class(1), type(1), >>> server(81.3.27.54), port(853), protocol(TCP) >>> ;; DEBUG: TLS, imported 129 certificates from '/etc/ssl/certs/ca- >>> bundle.crt' >>> ;; DEBUG: TLS, received certificate hierarchy: >>> ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com >>> ;; DEBUG: SHA-256 PIN: >>> pOvVkJSj6rWNPM0vR3hoJr/21kZI6TfImhowIEdcEUQ= >>> ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3 >>> ;; DEBUG: SHA-256 PIN: >>> YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= >>> ;; DEBUG: TLS, skipping certificate PIN check >>> ;; DEBUG: TLS, The certificate is trusted. >>> ;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20-POLY1305) >>> ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1349 >>> ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: >>> 1 >>> >>> ;; EDNS PSEUDOSECTION: >>> ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR >>> >>> ;; QUESTION SECTION: >>> ;; google.com. IN A >>> >>> ;; ANSWER SECTION: >>> google.com. 151 IN A 216.58.208.46 >>> >>> ;; Received 55 B >>> ;; Time 2018-12-11 20:30:29 CET >>> ;; From 81.3.27.54(a)853(TCP) in 25.2 ms >> >> 25ms is actually quite good! > Yes, i think so. > >> >>> >>> Great, will update my dot.conf. >>> >>> As a beneath one, try it currently with a seperat CGI to have a >>> better overview. >>> Patched now as you suggested the 'write_forward_conf()' function, >>> needed to disable >>> nevertheless update_forwarder() function in initscript if >>> forward.conf should be used >>> ... (there is more) >>> >> >> As we talked about before, I think that we can skip the DNSSEC tests >> entirely. They are more damaging than anything else. > Yes indeed, i think update_forwarders disables also any forwarder via > unbound-control. Disables them? It is meant to overwrite them with the current DNS servers without restarting unbound. > >> That means that we should probably be looking at having a switch >> somewhere that enables DNS-over-TLS first and then all configured >> name servers are just used without further tests. > Have tried it now in this way --> > https://git.ipfire.org/?p=ipfire-2.x.git;a=blob;f=src/initscripts/system/unbound;h=cc46c33c9425cc85d95b1d7412a9db3e146fea4b;hb=refs/heads/next#l154 > . If unbound init finds an 'on' (enabled) in tlsconfig (which will be produced by CGI), > it doesn´t execute update_forwarders. Am currently not sure if we need possibly > the same for dnsforward config. Have tested it with a dummy entry but an > 'unbound-control list_forwarders' shows nothing. > If there is no entry or everything is 'off' unbound uses the old > DNS servers configured via setup. In case of “off”, unbound is supposed to run in recursor mode. >> In the default configuration that cannot be the case because of the >> problems we are trying to overcome by this script. > Isn´t forward.conf not a good place for this ? For what exactly? >> >> But Erik, please let’s find a strategy first because everything is >> being implemented. > Am happy with this but i really need to know first what´s happen in the > existing stuff, also i need to test for myself which ways may be > possible to overcome side affects. I need there also some new knowledge > causing the whole DNS/unbound thing but also insides how all that has > already been implemented. > > In here --> > https://git.ipfire.org/?p=people/ummeegge/ipfire-2.x.git;a=commit;h=90e45d849e5fa185e4dcf83844e85d68474a09f5 > a first and also better tested version of DoT can be found whereby i am > happy if someone comes around for some testings/enhancements. > > Merging all DNS CGI´s can be one of the following parts (not sure if i´ am the right one for this) > but i need a working solution to see how the system is in harmony with all that. > Also the dnsforwarding.cgi is in my humble opinion currently not working > or i did there really something wrong. > > What strategy would you prefer ? I do not have one yet. I am just saying that there should be one and that it should be discussed before it is being implemented. I can say that I have a couple of things that are not working for me. That would be that I do not think that an extra CGI is required. We can use the one that we have (although for testing it can be implemented where ever you prefer) and that DNS-over-TLS cannot be enabled by default. I also have a long list of issues that I would like to see tackled here as well. Those are that the unbound initscript is not behaving as intended. Extending it has to be done very careful to not break it even more or we make it shorter first and boil the problems down first and then add DNS-over-TLS. >> I am absolutely happy that you are doing such good work here, but >> keep in mind that this needs to be integrated into IPFire in a slow >> and peer-reviewed way. > Need to think about how we can split things here. Do you have some > ideas ? What is there to do? It looks like you have a working version of the initscript and the UI (almost?) done. > Another thing i have in account is the QNAME minimisation --> > https://tools.ietf.org/html/rfc7816 > even in unbound.conf 'qname-minimisation: yes' is active it didn´t > worked for me: > > $ dig txt qnamemintest.internet.nl +short > a.b.qnamemin-test.internet.nl. > "NO - QNAME minimisation is NOT enabled on your resolver :(" > > needed to add also > > qname-minimisation-strict: yes > harden-below-nxdomain: yes Please open a ticket for that. Harden-below-nxdomain is deliberately disabled because it breaks loads of things and I do not consider it a correct solution. > at earlier tests in my local.d conf to get an > > a.b.qnamemin-test.internet.nl. > "HOORAY - QNAME minimisation is enabled on your resolver :)!" > > . Should we extend unbound.conf or should i add this one in > forward.conf if DoT is active ? Or is this may not wanted ? > This has nothing to do with DNS-over-TLS. Therefore this should be handled independently. > > Some thoughts/news from here. > > Best, > > Erik -Michael ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-12 15:25 ` Michael Tremer @ 2018-12-12 17:44 ` ummeegge 2018-12-13 6:52 ` ummeegge 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-12 17:44 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 11521 bytes --] Hi Michael, Am Mittwoch, den 12.12.2018, 15:25 +0000 schrieb Michael Tremer: > Hey, > > > On 12 Dec 2018, at 13:42, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > Hi Michael, > > > > Am Dienstag, den 11.12.2018, 19:54 +0000 schrieb Michael Tremer: > > > Hey, > > > > > > On 11 Dec 2018, at 19:43, ummeegge <ummeegge(a)ipfire.org> wrote: > > > > > > > > Hi Michael, > > > > tried that now with this one --> > > > > > > > > https://people.ipfire.org/~ummeegge/screenshoots/dns-over-tls_wui.png > > > > > > This looks good, but under no circumstances should there be > > > *another* > > > place where to configure DNS servers. > > > > Sure. I need to check for myself how this can be accomplished so i > > take > > it step-by-step and with a clear CGI it is simply easier for me. > > > > > > > We already have three. They need to be unified to one. > > > > You mean dns.cgi and dnsforward.cgi ? > > No. We have the following places where users can configure their DNS > servers: > > For RED = STATIC: setup > > For RED = DHCP: dns.cgi > > For RED = PPP: The PPP profile > OK i see. This is also a problem for me here to test or to check further since RED is here static only. > It can be argued that it makes sense to have different DNS servers in > place for each PPP profile (I do not think that this has any users at > all. Either you use your ISP’s DNS or not). > > But overall it is confusing and also quite complicated in the code > that we are reading the DNS servers from so many different places all > the time. This needs to be simplified. There is a ticket for it since > 2015: > > https://bugzilla.ipfire.org/show_bug.cgi?id=10886 I think this topic might be a good reason to change this but as mentioned am not able to do this here. > > > > > > > > > > > > > > ... the HTML formatting kills me :D ... > > > > > > > > and it looks now good: > > > > > > > > $ kdig -d @81.3.27.54 +tls-ca=/etc/ssl/certs/ca-bundle.crt > > > > +tls- > > > > host=rec1.dns.lightningwirelabs.com google.com > > > > ;; DEBUG: Querying for owner(google.com.), class(1), type(1), > > > > server(81.3.27.54), port(853), protocol(TCP) > > > > ;; DEBUG: TLS, imported 129 certificates from > > > > '/etc/ssl/certs/ca- > > > > bundle.crt' > > > > ;; DEBUG: TLS, received certificate hierarchy: > > > > ;; DEBUG: #1, CN=rec1.dns.lightningwirelabs.com > > > > ;; DEBUG: SHA-256 PIN: > > > > pOvVkJSj6rWNPM0vR3hoJr/21kZI6TfImhowIEdcEUQ= > > > > ;; DEBUG: #2, C=US,O=Let's Encrypt,CN=Let's Encrypt Authority > > > > X3 > > > > ;; DEBUG: SHA-256 PIN: > > > > YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg= > > > > ;; DEBUG: TLS, skipping certificate PIN check > > > > ;; DEBUG: TLS, The certificate is trusted. > > > > ;; TLS session (TLS1.2)-(ECDHE-ECDSA-SECP256R1)-(CHACHA20- > > > > POLY1305) > > > > ;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 1349 > > > > ;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 0; > > > > ADDITIONAL: > > > > 1 > > > > > > > > ;; EDNS PSEUDOSECTION: > > > > ;; Version: 0; flags: ; UDP size: 4096 B; ext-rcode: NOERROR > > > > > > > > ;; QUESTION SECTION: > > > > ;; google.com. IN A > > > > > > > > ;; ANSWER SECTION: > > > > google.com. 151 IN A 216.58.208.46 > > > > > > > > ;; Received 55 B > > > > ;; Time 2018-12-11 20:30:29 CET > > > > ;; From 81.3.27.54(a)853(TCP) in 25.2 ms > > > > > > 25ms is actually quite good! > > > > Yes, i think so. > > > > > > > > > > > > > Great, will update my dot.conf. > > > > > > > > As a beneath one, try it currently with a seperat CGI to have a > > > > better overview. > > > > Patched now as you suggested the 'write_forward_conf()' > > > > function, > > > > needed to disable > > > > nevertheless update_forwarder() function in initscript if > > > > forward.conf should be used > > > > ... (there is more) > > > > > > > > > > As we talked about before, I think that we can skip the DNSSEC > > > tests > > > entirely. They are more damaging than anything else. > > > > Yes indeed, i think update_forwarders disables also any forwarder > > via > > unbound-control. > > Disables them? It is meant to overwrite them with the current DNS > servers without restarting unbound. I meant the update_forwarder() function --> https://git.ipfire.org/?p=ipfire-2.x.git;a=blob;f=src/initscripts/system/unbound;h=cc46c33c9425cc85d95b1d7412a9db3e146fea4b;hb=refs/heads/next#l154 as far i understand 'unbound-control -q forward off' . But also for write_forward_conf() where i integrated DoT needed a restart of unbound as far as i can see/tested since we need different unbound.conf directives: server: tls-cert-bundle: /etc/ssl/certs/ca-bundle.crt forward-zone: forward-tls-upstream: yes unbound needed to read out the config file again. The first version started DoT via 'unbound-control start' but i couldn´t manage this in this version?! > > > > > > That means that we should probably be looking at having a switch > > > somewhere that enables DNS-over-TLS first and then all configured > > > name servers are just used without further tests. > > > > Have tried it now in this way --> > > https://git.ipfire.org/?p=ipfire-2.x.git;a=blob;f=src/initscripts/system/unbound;h=cc46c33c9425cc85d95b1d7412a9db3e146fea4b;hb=refs/heads/next#l154 > > . If unbound init finds an 'on' (enabled) in tlsconfig (which will > > be produced by CGI), > > it doesn´t execute update_forwarders. Am currently not sure if we > > need possibly > > the same for dnsforward config. Have tested it with a dummy entry > > but an > > 'unbound-control list_forwarders' shows nothing. > > If there is no entry or everything is 'off' unbound uses the old > > DNS servers configured via setup. > > In case of “off”, unbound is supposed to run in recursor mode. Haven´t experienced this here. Did You ? unbound switched only back to the initially configured DNS servers if "off" or not presant. > > > > In the default configuration that cannot be the case because of > > > the > > > problems we are trying to overcome by this script. > > > > Isn´t forward.conf not a good place for this ? > > For what exactly? For extending unbound.conf . > > > > > > > But Erik, please let’s find a strategy first because everything > > > is > > > being implemented. > > > > Am happy with this but i really need to know first what´s happen in > > the > > existing stuff, also i need to test for myself which ways may be > > possible to overcome side affects. I need there also some new > > knowledge > > causing the whole DNS/unbound thing but also insides how all that > > has > > already been implemented. > > > > In here --> > > https://git.ipfire.org/?p=people/ummeegge/ipfire-2.x.git;a=commit;h=90e45d849e5fa185e4dcf83844e85d68474a09f5 > > a first and also better tested version of DoT can be found whereby > > i am > > happy if someone comes around for some testings/enhancements. > > > > Merging all DNS CGI´s can be one of the following parts (not sure > > if i´ am the right one for this) > > but i need a working solution to see how the system is in harmony > > with all that. > > Also the dnsforwarding.cgi is in my humble opinion currently not > > working > > or i did there really something wrong. > > > > What strategy would you prefer ? > > I do not have one yet. I am just saying that there should be one and > that it should be discussed before it is being implemented. I see. > > I can say that I have a couple of things that are not working for me. > That would be that I do not think that an extra CGI is required. We > can use the one that we have (although for testing it can be > implemented where ever you prefer) and that DNS-over-TLS cannot be > enabled by default. update_forwarders() was the main problem here in both developmant stages. Anyways, DoT works for me good some testing scenarios and the resulting informations are available for further development but sadly i can not test all that but can offer the already working CGI and sureley some trial and errors if this is needed. > > I also have a long list of issues that I would like to see tackled > here as well. Those are that the unbound initscript is not behaving > as intended. Extending it has to be done very careful to not break it > even more or we make it shorter first and boil the problems down > first and then add DNS-over-TLS. That´s plausible. Since i done also some testings in unbound initscript, i can may try to do also some work in there but as you already said, this would really need coordination/description of what/how to do. > > > > I am absolutely happy that you are doing such good work here, but > > > keep in mind that this needs to be integrated into IPFire in a > > > slow > > > and peer-reviewed way. > > > > Need to think about how we can split things here. Do you have some > > ideas ? > > What is there to do? Currently not sure how to find here a way of a release structure in a peer-reviewed way. > > It looks like you have a working version of the initscript and the UI > (almost?) done. Yes, this version works for me. Installed it on a fresh installation (OpenSSL-1.1.1a ;), tried to kill/test it on an old installation but it worked so far (a little slow since it restart unboundctrl if things are changing in there). Haven´t find bugs in the UI since now may someone have some for me ? > > > Another thing i have in account is the QNAME minimisation --> > > https://tools.ietf.org/html/rfc7816 > > even in unbound.conf 'qname-minimisation: yes' is active it didn´t > > worked for me: > > > > $ dig txt qnamemintest.internet.nl +short > > a.b.qnamemin-test.internet.nl. > > "NO - QNAME minimisation is NOT enabled on your resolver :(" > > > > needed to add also > > > > qname-minimisation-strict: yes > > harden-below-nxdomain: yes > > Please open a ticket for that. OK, will do that. > > Harden-below-nxdomain is deliberately disabled because it breaks > loads of things and I do not consider it a correct solution. Great info! 'harden-below-nxdomain: yes' is also not needed for QNAME minimization. > > > at earlier tests in my local.d conf to get an > > > > a.b.qnamemin-test.internet.nl. > > "HOORAY - QNAME minimisation is enabled on your resolver :)!" > > > > . Should we extend unbound.conf or should i add this one in > > forward.conf if DoT is active ? Or is this may not wanted ? > > > > This has nothing to do with DNS-over-TLS. Therefore this should be > handled independently. Yes, as mentioned will open a ticket for this. Another thing has come to mind. A kdig check for the configured DoT servers might be nice. May like it is managed in ddns.cgi with the syncronisation function. For example a kdig command can be used to grep for "is trusted" and the "rd" flag and if true to set a green colored hostname in (currently) dnsovertls.cgi, if not a red colored one can help the user for better understanding if/or_which one is not working so possible missconfiguration can be detected easier since the number of DNS servers are not limited and open for randomization ? As a beneath one, Cloudflair offers TLS1.3 support since a couple of days/weeks now. Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-12 17:44 ` ummeegge @ 2018-12-13 6:52 ` ummeegge 2018-12-13 16:26 ` Michael Tremer 0 siblings, 1 reply; 28+ messages in thread From: ummeegge @ 2018-12-13 6:52 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2451 bytes --] Hi all, a little update to this comment Am Mittwoch, den 12.12.2018, 18:44 +0100 schrieb ummeegge: > > As a beneath one, Cloudflair offers TLS1.3 support since a couple of > days/weeks now. > have tested now a couple of DoT servers and wanted to update some infos causing encryption but also sorted by speed: *.quad9.net (TLS1.2)-(ECDHE-SECP256R1)-(ECDSA-SHA512)-(AES-256-GCM) 9.9.9.10 in 12.4 ms *.quad9.net (TLS1.2)-(ECDHE-SECP256R1)-(ECDSA-SHA512)-(AES-256-GCM) 9.9.9.9 in 18.7 ms rec1.dns.lightningwirelabs.com (TLS1.2)-(ECDHE-X25519)-(ECDSA-SHA512)-(CHACHA20-POLY1305) 81.3.27.54 in 24.9 ms *.tenta.io (TLS1.2)-(ECDHE-SECP521R1)-(ECDSA-SHA256)-(CHACHA20-POLY1305) 99.192.182.200 in 28.7 ms kaitain.restena.lu (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA512)-(AES-256-GCM) 158.64.1.29 in 29.6 ms dnsovertls2.sinodun.com (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 145.100.185.17 in 45.1 ms *.cloudflare-dns.com (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM) 1.0.0.1 in 46.1 ms *.cloudflare-dns.com (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM) 1.1.1.1 in 47.8 ms dot-de.blahdns.com (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 159.69.198.101 in 61.1 ms dns.neutopia.org (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 89.234.186.112 in 62.2 ms securedns.eu (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 146.185.167.43, 146.185.167.43 in 72.8 ms in 75.1 ms getdnsapi.net (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 185.49.141.37 in 88.4 ms dnsovertls3.sinodun.com (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 145.100.185.18 in 91.2 ms dns.cmrg.net (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 199.58.81.218 in 100.8 ms Lightningwirelabs is really pretty fast (@Michael, did you changed to curve25519 ? seems to be some ms faster) but also TLS1.3 seems to become more common as i thought. Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-13 6:52 ` ummeegge @ 2018-12-13 16:26 ` Michael Tremer 0 siblings, 0 replies; 28+ messages in thread From: Michael Tremer @ 2018-12-13 16:26 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 3435 bytes --] Hi, > On 13 Dec 2018, at 06:52, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hi all, > a little update to this comment > > Am Mittwoch, den 12.12.2018, 18:44 +0100 schrieb ummeegge: >> >> As a beneath one, Cloudflair offers TLS1.3 support since a couple of >> days/weeks now. >> > > have tested now a couple of DoT servers and wanted to update some infos > causing encryption but also sorted by speed: > > *.quad9.net (TLS1.2)-(ECDHE-SECP256R1)-(ECDSA-SHA512)-(AES-256-GCM) > 9.9.9.10 in 12.4 ms > > *.quad9.net (TLS1.2)-(ECDHE-SECP256R1)-(ECDSA-SHA512)-(AES-256-GCM) > 9.9.9.9 in 18.7 ms > > rec1.dns.lightningwirelabs.com (TLS1.2)-(ECDHE-X25519)-(ECDSA-SHA512)-(CHACHA20-POLY1305) > 81.3.27.54 in 24.9 ms > > *.tenta.io (TLS1.2)-(ECDHE-SECP521R1)-(ECDSA-SHA256)-(CHACHA20-POLY1305) > 99.192.182.200 in 28.7 ms > > kaitain.restena.lu (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA512)-(AES-256-GCM) > 158.64.1.29 in 29.6 ms > > dnsovertls2.sinodun.com (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) > 145.100.185.17 in 45.1 ms > > *.cloudflare-dns.com (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM) > 1.0.0.1 in 46.1 ms > > *.cloudflare-dns.com (TLS1.3)-(ECDHE-SECP256R1)-(ECDSA-SECP256R1-SHA256)-(AES-256-GCM) > 1.1.1.1 in 47.8 ms > > dot-de.blahdns.com (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) > 159.69.198.101 in 61.1 ms > > dns.neutopia.org (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) > 89.234.186.112 in 62.2 ms > > securedns.eu (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) > 146.185.167.43, 146.185.167.43 > in 72.8 ms in 75.1 ms > > getdnsapi.net (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) > 185.49.141.37 in 88.4 ms > > dnsovertls3.sinodun.com (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) > 145.100.185.18 in 91.2 ms > > dns.cmrg.net (TLS1.2)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) > 199.58.81.218 in 100.8 ms > > > > Lightningwirelabs is really pretty fast (@Michael, did you changed to curve25519 ? seems to be some ms faster) > but also TLS1.3 seems to become more common as i thought. This is the default cipher list of the OpenSSL version that is shipped with IPFire. We kind of prefer Curve25519 but not only for performance reasons. Mainly because it is free of any NSA cryptography. But cool to see that this is actually quite slow. I suppose that it is crucial to use a permanent connection or TFO might help, too. We are only fast because we might have the result cached and our hoster has actually really good peering to many locations. So, although you are travelling through half the country, it is not very far away from you on the Internet. This will probably be super slow from America or somewhere further away because of the long TCP handshake. Interesting too how we are standing out with our crypto :) -Michael > > Best, > > Erik > > > > > > > > > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 12:14 ` ummeegge 2018-12-10 12:32 ` ummeegge @ 2018-12-10 13:37 ` Michael Tremer 2018-12-11 2:01 ` Paul Simmons 2 siblings, 0 replies; 28+ messages in thread From: Michael Tremer @ 2018-12-10 13:37 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 4706 bytes --] Hey, > On 10 Dec 2018, at 12:14, ummeegge <ummeegge(a)ipfire.org> wrote: > > Hi Michael, > > Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer: > >> I am not sure what you are looking for. > Mainly for testing people which take also a look over the changes in > unbound initscript. Since the 'update_forwarders()' function from > unbound init will currently not be used if custom forwarders are in > usage. > 'update_forwarders()' includes really a lot of other functions and it > was/is not that easy to check for all possible side affects if this > function will be bypassed and substituded by another one (cue: DNSSEC, > EDNS, ...). All changes causing the unbound initscript can be found in > here --> > https://gitlab.com/ummeegge/dot-for-ipfire/commits/master/unbound > . > > Another point i am currently looking for is the question, if unbound is > the best possibility for DoT ? If you take look into the current > implementation status --> > https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status > unbound misses also some other DoT related features. > Am building currently GetDNS and Stubby just to get there also a better > inside of the differences. Those are just stub resolvers and no proxies. Out of the proxies unbound might not have the most ticks looking at the TLS features, but I do not see that as a problem. None of them are a must and unbound is under development. I am sure those will come. > Also, integrating DoT into webuserinterface is, as before mentioned in > here, a point. Should DoT become it´s own one, or is it a complete new > WUI menu point worth ? This is essential. I do not think that it should add another CGI, because we already have a DNS CGI script that we can use and extend. > In my humble opinion this DoT topic is still pretty much in a testing > phase not only speaking for myself but also looking around and finding > only two (may three) stable DoT providers speaks, i think, also a > little for itself. Yes, I agree. It is a new “feature” that was used to market Cloudflare’s DNS. Showing that they “care" about privacy. However, I think that this is not beta software any more, we can run this on larger scale and it solves a problem that existed before and is a nice solution to it, too. If IPFire wants to be bleeding-edge that we have to have this feature at some point. >> But I just wanted to say that I am following this conversation. > > That´s great. > >> >> So far I think that there are indeed many people interested in DoT. >> However, I have not received any feedback on what I was mailing >> before. >> > I hope some feedback comes around also since i am currently testing it > for a couple of weeks now and posted the results/code_changes in the > forum and some also in here. Yeah, I am not sure what I should be testing now. There is a bunch of software packages and there is a bunch of changes to scripts. This isn’t really ready for testing yet is it? I guess we should think about a strategy about which features we want to have in a first alpha stage and then have those agreed, implemented and then sent out in one package for testing. That makes it a lot easier. So I am thinking about this: * Make unbound ready for DNS-over-TLS (I believe that that is almost the case) * Change the scripts that write forwarders.conf. I do not think that we should perform DNSSEC checks on the DNS-over-TLS resolvers. * Extend the CGI that we can enter the IP addresses and host names What else do we need? > >> I think what is best now is to get this into small patches. What >> needs to be done to get this UI ready so that people can add those >> DNS servers? What will the default behaviour be? How will we make >> sure that the system does not fall back (to unauthenticated DNS)? >> > That´s the fundamental question, please see the above statements. > > >> I think that we can leave OpenSSL 1.1.1 aside for this for now, >> because it works perfectly fine with TLS 1.2. We should not mix >> multiple things together when they have no strict dependency >> (although I am really looking forward to see TLS 1.3 in IPFire soon). >> > OpenSSL-1.1.1 and TLS 1.3 fits perfectly into this topic and i hope i > can install today the new OpenSSL and to test it in my productive > environment. So far we don’t have OpenSSL 1.1.1. I think focussing on one at a time allows to develop this quicker. I am not even sure if any of the resolvers support TLS 1.3 today. Best, -Michael > > >> Best, >> -Michael >> >>> Best, >>> >>> Erik >>> >> >> > ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-10 12:14 ` ummeegge 2018-12-10 12:32 ` ummeegge 2018-12-10 13:37 ` Michael Tremer @ 2018-12-11 2:01 ` Paul Simmons 2018-12-11 20:09 ` ummeegge 2 siblings, 1 reply; 28+ messages in thread From: Paul Simmons @ 2018-12-11 2:01 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 3633 bytes --] On Mon, 2018-12-10 at 13:14 +0100, ummeegge wrote: > Hi Michael, > > Am Montag, den 10.12.2018, 00:21 +0000 schrieb Michael Tremer: > > > I am not sure what you are looking for. > > Mainly for testing people which take also a look over the changes in > unbound initscript. Since the 'update_forwarders()' function from > unbound init will currently not be used if custom forwarders are in > usage. > 'update_forwarders()' includes really a lot of other functions and it > was/is not that easy to check for all possible side affects if this > function will be bypassed and substituded by another one (cue: > DNSSEC, > EDNS, ...). All changes causing the unbound initscript can be found > in > here --> > https://gitlab.com/ummeegge/dot-for-ipfire/commits/master/unbound > . > > Another point i am currently looking for is the question, if unbound > is > the best possibility for DoT ? If you take look into the current > implementation status --> > https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Implementation+Status > unbound misses also some other DoT related features. > Am building currently GetDNS and Stubby just to get there also a > better > inside of the differences. > > Also, integrating DoT into webuserinterface is, as before mentioned > in > here, a point. Should DoT become it´s own one, or is it a complete > new > WUI menu point worth ? > > In my humble opinion this DoT topic is still pretty much in a testing > phase not only speaking for myself but also looking around and > finding > only two (may three) stable DoT providers speaks, i think, also a > little for itself. > > > But I just wanted to say that I am following this conversation. > > That´s great. > > > > > So far I think that there are indeed many people interested in DoT. > > However, I have not received any feedback on what I was mailing > > before. > > > > I hope some feedback comes around also since i am currently testing > it > for a couple of weeks now and posted the results/code_changes in the > forum and some also in here. > > > I think what is best now is to get this into small patches. What > > needs to be done to get this UI ready so that people can add those > > DNS servers? What will the default behaviour be? How will we make > > sure that the system does not fall back (to unauthenticated DNS)? > > > > That´s the fundamental question, please see the above statements. > > > > I think that we can leave OpenSSL 1.1.1 aside for this for now, > > because it works perfectly fine with TLS 1.2. We should not mix > > multiple things together when they have no strict dependency > > (although I am really looking forward to see TLS 1.3 in IPFire > > soon). > > > > OpenSSL-1.1.1 and TLS 1.3 fits perfectly into this topic and i hope i > can install today the new OpenSSL and to test it in my productive > environment. > > > > Best, > > -Michael > > > > > Best, > > > > > > Erik > > > > > > > > > Greetings, Erik. I am VERY pleased that you are pursuing DoT. I have a test environment prepared, and hope to test your changes on top of Core125 in the next few days. I started this thread because my (one and only available) ISP mangles DNS on port 53, preventing DNSSEC with IPFire. I want to use my IPFire machine without applying https://gitlab.com/snippets/1706804 on each update. Please continue with your pursuits and development. I will schedule down time to test. Thanks, and best regards, Paul -- A: Because it messes up the order in which people normally read text. Q: Why is it such a bad thing? A: Top-posting. Q: What is the most annoying thing on usenet and in e-mail? ^ permalink raw reply [flat|nested] 28+ messages in thread
* Re: [Fwd: Re: request for info: unbound via https / tls] 2018-12-11 2:01 ` Paul Simmons @ 2018-12-11 20:09 ` ummeegge 0 siblings, 0 replies; 28+ messages in thread From: ummeegge @ 2018-12-11 20:09 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 2274 bytes --] Hi Paul, Am Montag, den 10.12.2018, 20:01 -0600 schrieb Paul Simmons: > > Greetings, Erik. > > I am VERY pleased that you are pursuing DoT. > Your welcome, like that feature too. > I have a test environment prepared, and hope to test your changes on > top of Core125 in the next few days. > Great. There are meanwhile two branches here. The first one is the sysconfig "USE_FORWARDER=0" one which is fully working and in my opinion also easier/faster to test DoT/unbound for, let´s say, best practice configuration. Current state can be found under the already linked Gitlab address. The second one incl. now the WUI (have stolen/missused dnsforward.cgi for this ;) but also DoT integration in the already existing /etc/unbound/forward.conf . In there, i patched now the already existing 'write_forward_conf' function like Michael suggested --> @@ -192,6 +195,27 @@ ( config_header + # Add DNS-over-TLS forwarder configuration + + if [ -n "/var/ipfire/dnsforward/tlsconfig" ]; then + echo "# DNS-over-TLS configuration block" + echo "server:" + echo " tls-cert-bundle: /etc/ssl/certs/ca-bundle.crt" + echo + echo "forward-zone:" + echo " name: \".\"" + echo " forward-tls-upstream: yes" + fi + + local enabled domain ip port remark + while IFS="," read -r enabled domain ip port remark; do + # Line must be enabled + [ "${enabled}" = "on" ] || continue + echo " forward-addr: ${ip}@${port}#${domain}" + done < /var/ipfire/dnsforward/tlsconfig + + # DNS Forwarding + local insecure_zones="${INSECURE_ZONES}" local enabled zone server remark as a first one, this one is currently highly experimental but do works until now and might be a possible way further.?. > I started this thread because my (one and only available) ISP mangles > DNS on port 53, preventing DNSSEC with IPFire. I want to use my > IPFire > machine without applying https://gitlab.com/snippets/1706804 on each > update. > Please check in general if DoT works for your use case. > Please continue with your pursuits and development. I will schedule > down time to test. > Let´s see what we can all stick together in here :-) . Great that you test all that too. > Thanks, and best regards, > Paul > Thank you too. Best, Erik ^ permalink raw reply [flat|nested] 28+ messages in thread
end of thread, other threads:[~2018-12-13 16:26 UTC | newest] Thread overview: 28+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <1525184928.3530.13.camel@gmail.com> 2018-05-01 14:33 ` [Fwd: Re: request for info: unbound via https / tls] Paul Simmons 2018-05-01 14:40 ` Peter Müller 2018-05-01 17:16 ` Paul Simmons 2018-05-03 16:03 ` Michael Tremer 2018-12-02 19:10 ` ummeegge 2018-12-02 20:23 ` Paul Simmons 2018-12-04 14:01 ` ummeegge 2018-12-04 16:19 ` Peter Müller 2018-12-05 7:35 ` ummeegge 2018-12-09 20:08 ` ummeegge 2018-12-10 0:21 ` Michael Tremer 2018-12-10 11:30 ` ummeegge 2018-12-10 0:21 ` Michael Tremer 2018-12-10 12:14 ` ummeegge 2018-12-10 12:32 ` ummeegge 2018-12-10 13:26 ` Michael Tremer 2018-12-10 14:37 ` ummeegge 2018-12-11 19:22 ` Michael Tremer 2018-12-11 19:43 ` ummeegge 2018-12-11 19:54 ` Michael Tremer 2018-12-12 13:42 ` ummeegge 2018-12-12 15:25 ` Michael Tremer 2018-12-12 17:44 ` ummeegge 2018-12-13 6:52 ` ummeegge 2018-12-13 16:26 ` Michael Tremer 2018-12-10 13:37 ` Michael Tremer 2018-12-11 2:01 ` Paul Simmons 2018-12-11 20:09 ` ummeegge
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox