From owner-freebsd-stable@freebsd.org Tue Jun 7 10:36:02 2016 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 263AEB6D6CB for ; Tue, 7 Jun 2016 10:36:02 +0000 (UTC) (envelope-from kraduk@gmail.com) Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 0567A1175 for ; Tue, 7 Jun 2016 10:36:02 +0000 (UTC) (envelope-from kraduk@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 01008B6D6CA; Tue, 7 Jun 2016 10:36:02 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F267BB6D6C8 for ; Tue, 7 Jun 2016 10:36:01 +0000 (UTC) (envelope-from kraduk@gmail.com) Received: from mail-wm0-x233.google.com (mail-wm0-x233.google.com [IPv6:2a00:1450:400c:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6FE131174 for ; Tue, 7 Jun 2016 10:36:01 +0000 (UTC) (envelope-from kraduk@gmail.com) Received: by mail-wm0-x233.google.com with SMTP id m124so107969387wme.1 for ; Tue, 07 Jun 2016 03:36:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=RHrTd+hHImzI9IK/KTHPqLViWevIMj0cn1qTE4MyWIE=; b=JV9Gih/5hf3H+d8Q6QTSU5bCKhA4Wnd0XRBl34s12G3PgqP7D6YCV6JqmM/vNlmB2E fmLkGlWjmHwEsl717av3sviWmqrWd4g8ezHrNX9YryRtu95pAN0+emsU5wW/M/49TmFX e+6JWiq/6a0qoQ7gMtb9zPwSOgz8NA+hRyzJ1cO4nmKRHWu+Aqj59+XXOY4ujq3OWD1b EugWArRwgWBrF9zgC5ta0B+iISZHWcBatgNcOy0QbJIPlf+zv5d6e/9Kbmjas8bqhv3W Pux9k/CyHOeDR2RbzwizTX2KnlyJ1QukPqnnIA7LtACt0PxiC1f65zJvhzATshPZmFQ9 u0ww== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=RHrTd+hHImzI9IK/KTHPqLViWevIMj0cn1qTE4MyWIE=; b=JfPC2hedlQuCFIp/SK/uv9w1nOfiOVCXALGOldHj3h1MhdpCP6KMYm4eYpdf8Af1Bt UP8p7T3SUsX8zdAtCEzLWbzfszbMxMu2o4i60Ko0EE6sGt3ThKsXsIhjLu+0Cn9hAI2h GhUQtNkfHViOA4Xjj8kHvrTPmLpjAGMS3BmElWcCGpKGzPIkxfPXHWc2S9U03iumpq4w x3bh9FqQof4y7Fa1zgRJ0nyjOU9Vu+EqhtvnF8E2K+gxvAnJG6vCpmWGrtHygIFkVLBF Ty9FEGo+VoRvPlSSuGPoqqrs0KRsQ1kx9CIEXZ3mtzhwpV50H5It4CCdCSIHT+eVDAmD itLQ== X-Gm-Message-State: ALyK8tJjdR0J0TRNx4FFPewRrK1oviyokAsIeTz3SJ+sbvpbJ0zaoyWl4yrbFHdPiXmBkzAX3OVdroAcF5vwJA== X-Received: by 10.194.74.104 with SMTP id s8mr9260657wjv.20.1465295759813; Tue, 07 Jun 2016 03:35:59 -0700 (PDT) MIME-Version: 1.0 Received: by 10.28.6.12 with HTTP; Tue, 7 Jun 2016 03:35:59 -0700 (PDT) In-Reply-To: <20160607084733.GM75630@zxy.spb.ru> References: <20160602122727.GB75625@zxy.spb.ru> <44lh2mi0k5.fsf@lowell-desk.lan> <20160603191523.GE75630@zxy.spb.ru> <44y46ie92p.fsf@lowell-desk.lan> <20160606135018.GL75630@zxy.spb.ru> <20160607084733.GM75630@zxy.spb.ru> From: krad Date: Tue, 7 Jun 2016 11:35:59 +0100 Message-ID: Subject: Re: unbound and ntp issuse To: Slawa Olhovchenkov Cc: "stable@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.22 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jun 2016 10:36:02 -0000 Like i said you could configure ntpdate as well as ntpd, but give it a known good ip. It will only run once at boot, and ntpd will start after so that can use the nice pool names. A slightly better way maybe to give ntpdate a server hostname like ntp-server and populated the hosts file with one of the ips from pool.ntp.org. You could then have a periodic script to check and update the ip in the hosts every day, so it works over a reboot. The ip would obviously have to have an initial seed value, but you could work this out progmatically at system configuration time with tools like ansible. On 7 June 2016 at 09:47, Slawa Olhovchenkov wrote: > On Tue, Jun 07, 2016 at 09:00:29AM +0100, krad wrote: > > > Well there is a deadlock situation there so you have to relax one of the > > conditions, for one time at least. > > > > Your best bet is to do a manual ntpdate against a fixed ip of known > > goodness. If you have a lot of machines you need to do this on, use > ansible > > or similar to do the heavy lifting for you. Ansible is best in my opinion > > if you dont have anything setup as its quick to get going. It does > require > > python on the target machines so you would need to install that first. > > Something like the following should get it working (as you dont have dns > on > > the target machine, package fetches wont work, so i would tunnel a squid > > proxy and let that handle all the internet stuff. > > > > add something like the following to your ssh_config > > > > Host * > > RemoteForward 31280 squid_server:3128 > > > > then run some stuff like this (after installing ansible on your > > desktop/bastion host) > > > > ansible -b -m raw -a '/usr/bin/env ASSUME_ALWAYS_YES=1 http_proxy= > > http://127.0.0.1:31280 /usr/sbin/pkg bootstrap -f' -u root -i > > -kS --ask-su-pass > > > > ansible -b -m raw -a 'env ASSUME_ALWAYS_YES=YES http_proxy= > > http://127.0.0.1:31280 pkg install python' -u root -i > > -kS --ask-su-pass > > > > ansible -m shell -a "ntpdate " -kS --ask-su-pass -i > > > > > > from here on you should be able to start unbound and then ntpd eg > > > > ansible -m service -a "name=local_unbound state=restarted" > > -kS --ask-su-pass -i > > ansible -m service -a "name=ntpd state=restarted" -kS --ask-su-pass -i > > > > > Alternatively you could just relax your dnssec rules on first boot to > give > > ntp a chance. Probably much easier 8) > > How I am do it? I am don't touch dnssec rules and don't know unbound. > May be this is posible by startup scripts? > Also, some platforms lack of CMOS time, RPi, for example. > > > Also make sure you are using the '-g' flag on ntpd > > Yes, I am add `ntpd_sync_on_start=yes` to rc.conf. > I am suggest do it by checkbox in bsdinstall. > > > > On 6 June 2016 at 14:50, Slawa Olhovchenkov wrote: > > > > > On Mon, Jun 06, 2016 at 09:33:02AM -0400, Lowell Gilbert wrote: > > > > > > > Slawa Olhovchenkov writes: > > > > > > > > > On Fri, Jun 03, 2016 at 02:34:18PM -0400, Lowell Gilbert wrote: > > > > > > > > > >> Slawa Olhovchenkov writes: > > > > >> > > > > >> > Default install with local_unbound and ntpd can't be functional > with > > > > >> > incorrect date/time in BIOS: > > > > >> > > > > > >> > Unbound requred correct time for DNSSEC check and refuseing > queries > > > > >> > ("Jul 1 20:17:29 yellowrat unbound: [3444:0] info: failed to > prime > > > > >> > trust anchor -- DNSKEY rrset is not secure . DNSKEY IN") > > > > >> > > > > > >> > ntpd don't have any numeric IP of ntp servers in ntp.conf -- > only > > > > >> > symbolic names like 0.freebsd.pool.ntp.org, as result -- can't > > > > >> > resolve (see above, about DNSKEY). > > > > >> > > > > >> I can't see how this would happen. DNSSEC doesn't seem to be > required > > > in > > > > >> a regular install as far as I can see. Certainly I don't have any > > > > > > > > > > I don't know reasson for enforcing DNSSEC in regular install. > > > > > I am just select `local_unbound` at setup time and enter > `127.0.0.1` as > > > > > nameserver address. > > > > > > > > That's not enough to configure unbound as a fully recursive DNS > > > > server. > > > > > > What I am missing? > > > Need to fix unbound setup scripts? bsdinstall scripts? > > > As I see unbound setup scripts detects 127.0.0.1 in resolv.conf and > > > configured unbound as fully recursive DNS server. > > > > > > > If your system gets its address through DHCP, it is probably > > > > getting DNS server addresses as well, and would work fine *without* > your > > > > configuring any of the DNS state. > > > > > > I am have static address and don't getting DNS server address. > > > > > > > >> problem on any of my systems, and I've never configured an anchor > on > > > the > > > > >> internal systems. > > > > >> > > > > >> > IMHO, ntp.conf need to include some numeric IP of public ntp > > > servers. > > > > >> > > > > >> Ouch; that's a terrible idea, for several different reasons. > > > > > > > > > > What else? > > > > > > > > All the normal reasons that hard-coding IP addresses is a bad idea; > they > > > > can change, you're encouraging a lot of people to use the same ones, > etc. > > > > > > And how to resolve this issuse: > > > > > > - default install with unbound as recursive DNS server (by default > > > enforcing DNSSEC) > > > - ntp time synchronisation > > > - stale CMOS time (2008 year) > > > _______________________________________________ > > > freebsd-stable@freebsd.org mailing list > > > https://lists.freebsd.org/mailman/listinfo/freebsd-stable > > > To unsubscribe, send any mail to " > freebsd-stable-unsubscribe@freebsd.org" > > > >