Hello blind users do you mind pissing the fuck off u dirty bastard Many thanks,Cloudflare Security
Sent from Yahoo Mail for iPhone On Sunday, July 14, 2019, 1:00 pm, bind-users-requ...@lists.isc.org wrote: Send bind-users mailing list submissions to bind-users@lists.isc.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.isc.org/mailman/listinfo/bind-users or, via email, send a message with subject or body 'help' to bind-users-requ...@lists.isc.org You can reach the person managing the list at bind-users-ow...@lists.isc.org When replying, please edit your Subject line so it is more specific than "Re: Contents of bind-users digest..." Today's Topics: 1. Re: static stub zone not working as expected (Jay Ford) 2. Re: rndc - sync before reload? (Anand Buddhdev) ---------------------------------------------------------------------- Message: 1 Date: Sat, 13 Jul 2019 10:18:33 -0500 (CDT) From: Jay Ford <jnf...@uiowa.net> To: Mark Andrews <ma...@isc.org> Cc: bind-users <bind-users@lists.isc.org> Subject: Re: static stub zone not working as expected Message-ID: <alpine.deb.2.20.1907131010590....@headset.its.uiowa.edu> Content-Type: text/plain; charset="iso8859-7"; Format="flowed" I'm still confused about why named looks further up the tree than c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa which it holds authoritatively via master/slave zone type. That seems like incorrect behavior. Is this something I can fix or work around? __________________________________________________________________________ Jay Ford <jnf...@uiowa.net>, Network Engineering, University of Iowa On Sat, 13 Jul 2019, Mark Andrews wrote: > I suspect this will be negative response synthesis. The cache has learnt that > d.f.ip6.arpa doesn?t exist in ip6.arpa and when the name in question is > looked up the covering NSEC is returned which covers all of ULA space. > > If I?m right querying for DS d.f.ip6.arpa will load the cache appropriately > to allow this to be triggered. One then needs to trigger a lookup for a name > which finds the covering NSEC in the search back through the cache. Named > skips some responses in the search depending on the content but aborts it on > others content. > -- > Mark Andrews > >> On 13 Jul 2019, at 00:42, Jay Ford <jnf...@uiowa.net> wrote: >> >> On Fri, 12 Jul 2019, Mark Andrews wrote: >>>> On 12 Jul 2019, at 1:00 pm, Mark Andrews <ma...@isc.org> wrote: >>>> >>>>> On 12 Jul 2019, at 11:12 am, Jay Ford <jnf...@uiowa.net> wrote: >>>>> >>>>> I have a similar problem with zones for IPv6 ULA space. I'm running BIND >>>>> 9.14.3. I had hoped that validate-except would do the trick, such as: >>>>> >>>>> validate-except { "f.ip6.arpa"; }; >>>>> >>>>> but alas, no. >>>>> >>>>> Extra puzzling so far is that the behavior is time-variable: delegated >>>>> zones will resolve most of the time, but then fail (NXDOMAIN) for a while. >>>>> >>>>> In the ULA space it doesn't seem trivial to own the top zone (ip6.arpa) >>>>> without breaking stuff. Any suggestions for that case? >>> >>> ULA space it trivial to own. D.F.IP6.ARPA is what you use if you have >>> multiple ULA prefixes. >>> If you have a single ULA prefix in use then just use that. e.g. >>> e.8.b.0.5.6.0.7.2.9.d.f.ip6.arpa >>> which matches the ULA prefix used in the system tests (fd92:7065:b8e::/48). >>> >>> This is no different to using 10.in-addr.arpa, 168.192.in-addr.arpa or one >>> of 16.172.in-addr.arpa >>> though 31.172.in-addr.arpa for RFC 1918 space. >>> >>> If fc00::/8 is ever used then you would also have C.F.IP6.ARPA. >>> >>> Named creates the D.F.IP6.ARPA zone automatically if you don?t create it >>> when the view is >>> configured for recursion. This is done to stop reverse lookups leaking >>> onto the internet >>> as a whole. >>> >>> % dig soa d.f.ip6.arpa >>> ;; BADCOOKIE, retrying. >>> >>> ; <<>> DiG 9.15.1 <<>> soa d.f.ip6.arpa >>> ;; global options: +cmd >>> ;; Got answer: >>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23519 >>> ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 >>> >>> ;; OPT PSEUDOSECTION: >>> ; EDNS: version: 0, flags:; udp: 4096 >>> ; COOKIE: aa8a24a1cce6c010b9d3a1b75d28009bb013cb0a2f58a961 (good) >>> ;; QUESTION SECTION: >>> ;d.f.ip6.arpa. IN SOA >>> >>> ;; ANSWER SECTION: >>> D.F.IP6.ARPA. 86400 IN SOA D.F.IP6.ARPA. . 0 28800 7200 >>> 604800 86400 >>> >>> ;; Query time: 0 msec >>> ;; SERVER: 127.0.0.1#53(127.0.0.1) >>> ;; WHEN: Fri Jul 12 13:38:03 AEST 2019 >>> ;; MSG SIZE rcvd: 116 >> >> Yep, that's what I thought. I have master/slave for the zone corresponding >> to my ULA /48 (c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa), which is solid including >> zones under it also handled as master/slave, but not for zones which are >> delegated via NS records to other servers (not master/slave), such as >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa which usually resolves like this: >> >> % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu >> >> ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns >>d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-itf.uiowa.edu >> ;; global options: +cmd >> ;; Got answer: >> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23886 >> ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1 >> >> ;; OPT PSEUDOSECTION: >> ; EDNS: version: 0, flags:; udp: 4096 >> ;; QUESTION SECTION: >> ;d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. IN NS >> >> ;; ANSWER SECTION: >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc1.iowa.uiowa.edu. >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc4.iowa.uiowa.edu. >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc3.iowa.uiowa.edu. >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc5.iowa.uiowa.edu. >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc2.iowa.uiowa.edu. >> d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. 3600 IN NS iowadc6.iowa.uiowa.edu. >> >> ;; Query time: 2 msec >> ;; SERVER: fd9a:2c75:7d0c:5::e#53(fd9a:2c75:7d0c:5::e) >> ;; WHEN: Fri Jul 12 09:19:30 CDT 2019 >> ;; MSG SIZE rcvd: 215 >> >> but sometimes fails like this: >> >> % dig -t ns d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu >> >> ; <<>> DiG 9.10.3-P4-Debian <<>> -t ns >>d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa @dns-cb.uiowa.edu >> ;; global options: +cmd >> ;; Got answer: >> ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20175 >> ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 >> >> ;; OPT PSEUDOSECTION: >> ; EDNS: version: 0, flags:; udp: 4096 >> ;; QUESTION SECTION: >> ;d.0.8.6.c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. IN NS >> >> ;; AUTHORITY SECTION: >> ip6.arpa. 3009 IN SOA b.ip6-servers.arpa. nstld.iana.org. 2019024499 >>1800 900 604800 3600 >> >> ;; Query time: 0 msec >> ;; SERVER: fd9a:2c75:7d0c:5::a#53(fd9a:2c75:7d0c:5::a) >> ;; WHEN: Fri Jul 12 09:19:25 CDT 2019 >> ;; MSG SIZE rcvd: 145 >> >> Those 2 servers (& others) are configured identically regarding the zones in >> question, but some of them sometimes fail this way despite being >> authoritative for c.0.d.7.5.7.c.2.a.9.d.f.ip6.arpa. An "rndc flushtree >> ip6.arpa" will fix it for a while. >> >> I do very similar stuff with zones for IPv4 RFC1918 space with no trouble. I >> had noticed the authenticated behavior for f.ip6.arpa differing from the >> behavior for 10.in-addr.arpa & friends. Thanks for poking at IANA about >> that. As I mentioned earlier, my use of validate-except { "f.ip6.arpa"; }; >> to work around that failed to help. Can you explain why? >> >> I might be hijacking this thread, but it seemed possible that my issue & that >> of the original poster could have a common root cause. I can start a >> different thread on the list or pursue it as a BIND bug if you think that's >> more appropriate. >> >> __________________________________________________________________________ >> Jay Ford <jnf...@uiowa.net>, Network Engineering, University of Iowa ------------------------------ Message: 2 Date: Sun, 14 Jul 2019 00:48:14 +0300 From: Anand Buddhdev <ana...@ripe.net> To: John Thurston <john.thurs...@alaska.gov>, bind-users@lists.isc.org Subject: Re: rndc - sync before reload? Message-ID: <8598f31c-5d21-5bfa-a70b-350f081aa...@ripe.net> Content-Type: text/plain; charset=utf-8 On 10/07/2019 20:08, John Thurston wrote: Hi John, > On a server with both static and dynamic zones, is there any reason to > perform an: > ? rndc sync > prior to issuing an: > ? rndc reload No, there is no need for a sync before reload. Regards, Anand ------------------------------ Subject: Digest Footer _______________________________________________ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users ------------------------------ End of bind-users Digest, Vol 3234, Issue 1 *******************************************
_______________________________________________ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users