Report information
The Basics
Id:
45322
Status:
new
Priority:
Medium/Medium
Queue:

People
Owner:
Nobody in particular
Requestors:
Cc:
AdminCc:

BugTracker
Version Fixed:
(no value)
Version Found:
(no value)
Versions Affected:
(no value)
Versions Planned:
(no value)
Priority:
P2 Normal
Severity:
S2 Normal
CVSS Score:
(no value)
CVE ID:
(no value)
Component:
BIND Common
Area:
feature

Dates
Created:Thu, 01 Jun 2017 17:02:29 -0400
Updated:Fri, 30 Jun 2017 05:57:45 -0400
Closed:Not set



This bug tracker is no longer active.

Please go to our Gitlab to submit issues (both feature requests and bug reports) for active projects maintained by Internet Systems Consortium (ISC).

Due to security and confidentiality requirements, full access is limited to the primary maintainers.

Subject: Consider revising the logging related to expired TSIG signatures
One of our customers encountered a situation where an underpowered VPN router (evidently with very large buffers) took over 5 minutes passing along the TCP stream for a zone transfer. This caused the signatures to be expired when named received the packets and attempted to verify them. The customer was initially sent off on the wrong troubleshooting path thanks to our log messages: 30-May-2017 16:44:46.814 xfer-in: error: transfer of 'SNIP/IN' from 10.54.53.121#53: failed while receiving responses: clocks are unsynchronized 30-May-2017 16:44:46.814 xfer-in: info: transfer of 'SNIP/IN' from 10.54.53.121#53: Transfer status: clocks are unsynchronized These messages sent them down the path of scrutinizing the (correct) NTP configuration and relative clocks. They have asked: Something more descriptive that would point away from NTP/TSIG as the sole cause...even if as simple as "transport problem or clocks are unsynchronized". I'm going to add that these messages would also be emitted if someone were to replay (intentionally or otherwise) signed messages. bconry