[nsd-users] NSD 4.10.1rc2 pre-release

Jeroen Koekkoek jeroen at nlnetlabs.nl
Thu Jul 25 19:22:34 UTC 2024


Hi Andreas,

Good to hear compilation works as expected.

I'll start looking into the notes/issues tomorrow.

Best regards,
Jeroen


On Thu, 2024-07-25 at 00:00 +0200, A. Schulze via nsd-users wrote:
> 
> 
> Am 23.07.24 um 17:28 schrieb Jeroen Koekkoek via nsd-users:
> > NSD 4.10.1rc2 pre-release is available:
> 
> no compile time warnings while building on debian bookworm/x86_64
> 
> > @bilias implemented mutual TLS authentication for zone transfers.
> > Please consult the nsd.conf manual for details on the newly
> > introduced
> > configuration options tls-auth-port and tls-auth-xfr-only.
> 
> this is an nice feature that seem to work but have some nits.
> 
> nsd serving as simple tls server is configured with
> 
> server:
> 	username: nsd
>          ip-address: ::@853
>          tls-service-key: /path/to/key.pem
>          tls-service-pem: /path/to/cert+intermediate.pem
>          tls-port: 853
> 
>          # since 4.10.1rc2
>          ip-address: ::@1853
>          tls-auth-port: 1853
>          tls-auth-xfr-only: yes
>          tls-cert-bundle: /path/to/ca-certificates.crt
> 
> 
> in this mode, /path/to/*.pem may accessible for the root user only.
> 
> Now, when adding a tls-auth for the purpose of client authentication
> I add
> 
> tls-auth:
>          name: primary.nsd.example
>          auth-domain-name: primary.nsd.example
>          client-cert: /path/to/cert+intermediate.pem
>          client-key: /path/to/key.pem
> 
> Here, the files /path/to/*.pem are used by a child process with
> limited privileges of the username 'nsd'
> It would be better, if nsd read all tls-auth client-[cert|key] data
> before dropping privileges.
> Then the files could be still limited to be readable by the root
> user.
> 
> next question:
> now, the axfr request from secondary to primary is a mTLS connection.
> But what about notify messages
> from primary to secondary? the zone-statement 'notify' does not
> mention a tls-auth-name
> Are these notifies still plain, unencrypted, unauthenticated UDP
> packets?
> 
> next note:
> I used an IPv6 network for my zone transfer tests and have the
> impression,
> the outgoing-interface statement at the secondary is not working if
> AXFR-over-tls is used.
> 
> next note:
> while trying to get AXFR-over-tls working, I saw errors like "error:
> xfrd tls: TLS verify failed - (62) depth: 0 error: hostname mismatch"
> It would be helpful to see there "... hostname mismatch: expected
> 'foo', got 'bar'"
> 
> funny side note:
> after "error: xfrd tls: TLS verify failed - (62) depth: 0 error:
> hostname mismatch" I also saw
> "error: xfrd: TLS handshake failed: Success"
> 
> Andreas
> _______________________________________________
> nsd-users mailing list
> nsd-users at lists.nlnetlabs.nl
> https://lists.nlnetlabs.nl/mailman/listinfo/nsd-users



More information about the nsd-users mailing list