Re: ddns stopped working after F26 update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tim:
I think you need to tell us if your updates were on the server,
clients, or both. And what is not working. Clients not being issued IPs?

Barry Scott:
I recall having to patch things up when the client id algorithm changed a about 4 years ago. Has that happened again?

I don't know, but it's the kind of thing I've noticed when multi-booting. Each OS got a different IP, because the network card looked different in some way. And that played merry hell with name assignment.

NB: My DNS and DHCP servers are running on a very old Fedora installation. Mine is a mix of fixed and dynamic. With the DHCP server assigning some clients a fixed IP, and those IPs hand entered into the DNS configuration (I found DHCP wouldn't put those into the DNS records). And the dynamic assignments giving an IP to the clients, who provide their own hostname, which goes into the DHCP leases and DNS records.

I have noticed the odd one or two things which won't play ball. My printer gets given its IP by the DHCP server, it has its own hostname, but that name never gets sent to the DHCP server. It only works fully with the mDNS nonsense (Bonjour, etc). And something similar with the odd Windows client.

To restate the issue.
* ddns is no longer setting hostname in DNS.
* The dns-update.log file is not longer being written to.

Is it not setting any? i.e. I see you have fixed definitions. Is it setting them? Is it setting dynamically assigned ones?

I know you've mentioned specific examples below, but if you set up new dynamic or fixed ones, do they work?

I have 3 systems that where updated from f25 to f26
fable is the router and runs ddns setup
varric is a desktop and used dhcp to get its address and provide its name. It gets an address but no name is setup.
the other f26 machine uses a static IP.
blackstar is a win10 machine and it cannpt set its name in DNS but dhcpd gives it an address.

fable is setup to log all update activity into /var/log/dns-update.log. That log file,  is no longer being written to since f26 update.

Another of those new journalctl snafus?
Is it chrooted?

There are no error that I can find for dhcpd or chroot-named. Except this one:
uid lease 172.16.2.145 for client 78:48:59:89:e5:81 is duplicate on 172.16.2.0/24
which has the MAC of one of my switches.

That could be tripping things up.

My inclination would be to stop both DNS and DHCP servers, wipe out the DHCP leases file, remove any dynamically entered records in the DNS files (and update the serial numbers), delete the dns journal files, and see if it will start with a clean slate.

I have replace the keys with <name-of-key>.

Here is /var/named/chroot/etc/named.conf

//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//

acl "if4_internal" {
     127.0.0.1;
     172.16.2.0/24;
};
acl "if6_internal" {
     ::1;
};

options {
     listen-on port 53       { "if4_internal"; };
     listen-on-v6 port 53    { "if6_internal"; };
     directory               "/var/named";
     dump-file               "/var/named/data/cache_dump.db";
     statistics-file         "/var/named/data/named_stats.txt";
     memstatistics-file      "/var/named/data/named_mem_stats.txt";
     allow-query             { "if4_internal"; "if6_internal"; };

     /*
      - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
      - If you are building a RECURSIVE (caching) DNS server, you need to enable
        recursion.
      - If your recursive DNS server has a public IP address, you MUST enable access
        control to limit queries to your legitimate users. Failing to do so will
        cause your server to become part of large scale DNS amplification
        attacks. Implementing BCP38 within your network would greatly
        reduce such attack surface
     */
     recursion               yes;

     dnssec-enable           yes;
     dnssec-validation       yes;
     dnssec-lookaside        auto;

     /* Path to ISC DLV key */
     bindkeys-file           "/etc/named.iscdlv.key";

     managed-keys-directory  "/var/named/dynamic";

     pid-file                "/run/named/named.pid";
     session-keyfile         "/run/named/session.key";
};


Do those keyfiles exist? Are they readable? Right permissions and SELinux contexts? Check on the PID file, too.



logging {
     category dnssec                 { security_log; };
     category update                 { update_log; };
     category update-security        { update_log; };
     category security               { security_log; };
     category general                { security_log; };
     category queries                { query_log; };
     category lame-servers           { null; };

     channel update_log {
         file "/var/log/dns-update.log" versions 10 size 20m;
         // every time the log grows over 20 Mbyte, it will
         // backup and rollover. Maximum 5 backups will be kept.
         print-time yes;
         print-category yes;
         print-severity yes;
         severity info;
         };

     channel security_log {
         file "/var/log/dns-security.log" versions 10 size 20m;
         // every time the log grows over 20 Mbyte, it will
         // backup and rollover. Maximum 5 backups will be kept.
         print-time yes;
         print-category yes;
         print-severity yes;
         severity info;
         };

     channel query_log {
         file "/var/log/dns-query.log" versions 10 size 20m;
         print-time yes;
         print-severity yes;
         };
};

key "rndc-key" {
     algorithm hmac-md5;
     secret "<rdnc-key>";
};

key "dhcp-key" {
     algorithm hmac-md5;
     secret "<dhcp-key>";
};

controls {
     inet 127.0.0.1 port 953
         allow { 127.0.0.1; }
         keys { "rndc-key"; "dhcp-key"; };
     inet ::1 port 953
         allow { ::1; }
         keys { "rndc-key"; "dhcp-key"; };
};


Is port 953 open?
Is IPv6 working?


// barry home zone
zone "chelsea.private" {
     type            master;
     file            "data/chelsea.private.hosts";
     allow-update    { key "dhcp-key"; key "rndc-key"; };
};



zone "2.16.172.IN-ADDR.ARPA" {
     type            master;
     file            "data/chelsea.private.rev";
     allow-update    { key "dhcp-key"; key "rndc-key"; };
};

zone "." IN {
     type hint;
     file "named.ca";
};

include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";

And here is dhcpd.conf

#
#   fable dhcpd configuration
#
authoritative ;
ddns-update-style standard;

allow booting;
allow bootp;

option domain-name "chelsea.private";

default-lease-time 3600;
max-lease-time 64800;

key "dhcp-key" {
     algorithm hmac-md5;
     secret "<dhcp-key>";
};

zone chelsea.private. {
     primary 127.0.0.1;
     key "dhcp-key";
}

zone 2.16.172.in-addr.arpa. {
     primary 127.0.0.1;
     key "dhcp-key";
}


subnet 172.16.2.0 netmask 255.255.255.0 {
     option domain-name-servers 172.16.2.254;
     option routers 172.16.2.254;
     range 172.16.2.100 172.16.2.199;
    # next-server 172.16.2.200;
    # filename "pxelinux.0";

     # dynamic updates
     ddns-updates on;
     ddns-domainname "chelsea.private.";
     ddns-rev-domainname "in-addr.arpa.";
     allow client-updates;
}

# npppd uses 172.16.2.90 to 172.16.2.99

host skynet     { hardware ethernet 00:09:5b:a3:5a:b0; fixed-address 172.16.2.3; }
# squeeze box
host songplayer { hardware ethernet 00:04:20:05:ae:4e; fixed-address 172.16.2.25; }

# host fender	172.16.2.200
# host itunes	172.16.2.201

# Wireless bridges
host hpsw-down {
     hardware ethernet 78:48:59:89:d8:25;
     fixed-address 172.16.2.251;
     # dynamic updates
     ddns-updates on;
     ddns-domainname "chelsea.private.";
     ddns-rev-domainname "in-addr.arpa.";
     allow client-updates;
     }
host hpsw-up {
     hardware ethernet 78:48:59:89:e5:81;
     fixed-address 172.16.2.252;
     # dynamic updates
     ddns-updates on;
     ddns-domainname "chelsea.private.";
     ddns-rev-domainname "in-addr.arpa.";
     allow client-updates;
     }

host timecapsule { hardware ethernet 70:56:81:c6:61:6b; fixed-address 172.16.2.253; }
# host fable	172.16.2.254

# example of pxeboot for openbsd
#host dim2       { hardware ethernet 00:30:18:a3:0c:25; fixed-address 172.16.2.99; filename "pxeboot.openbsd51"; }



--
Trying out Thunderbird for mail.
5... 4... 3... 2... ONE!  Email has gone

Boilerplate: All mail to this mailbox is automatically deleted, there is no point trying to privately email me, I only get to see the messages posted to the mailing list.
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux