Thanks. I have opened a ticket with AWS support asking them to allow us to pull 
slave copies of our VPC-internal zones. If they don’t do that, then making the 
zones slaves will not fix our problem, because the AWS endpoints refuse to 
answer iterative queries.

Thanks,
Maria

> On Apr 7, 2020, at 4:09 PM, Mark Andrews <ma...@isc.org> wrote:
> 
> Add delegations if they are missing. This is how DNS is designed to be 
> managed.
> 
> This should have been done as  part of allocating the address  space  
> initially.
> -- 
> Mark Andrews
> 
>> On 8 Apr 2020, at 02:43, bind-li...@iano.org wrote:
>> 
>> Currently our linux caching resolvers have a forwarding rule for 
>> 10.in-addr.arpa back to a small subset of our approximately 200 AD domain 
>> controllers. We made it a stub zone at one point in the past, but ran into 
>> intermittent resolution problems, although I don’t recall the details. We’ve 
>> never tried making it a slave zone as you recommend. If it would be better 
>> to change that to a slave zone then we want to do that, but there is a 
>> concern. Not all subdomains are delegated under 10.in-addr.arpa over on the 
>> AD side, and it is used as a catch-all for those that aren’t. Hundreds of 
>> thousands of desktops, laptops, devices and servers are constantly renewing 
>> and updating their IP addresses, and that domain is constantly changing. 
>> This would lead to our caching resolvers constantly pulling zone transfers 
>> from the AD servers. What would you recommend we do on the linux side to 
>> mitigate that, and is it still best to make it a slave zone in that case? We 
>> can make recommendations for changes on the AD side, but changes there take 
>> longer and are more complex to put in place. It’s easier if we can work 
>> around it on the linux side.
>> 
>> Thanks!
>> Maria
>> 
>>> On Apr 6, 2020, at 8:30 PM, Mark Andrews <ma...@isc.org> wrote:
>>> 
>>> As 10.in-addr.arpa is private namespace *all* of you recursive servers 
>>> should be configured to serve it.  This is similar to how all of your 
>>> recursive nameservers know where the root servers are except you are using 
>>> a slave zone instead of a hint zone.
>>> 
>>> i.e.
>>> 
>>> 10.in-addr.arpa {
>>>   type slave;
>>>   masters { <address of AD server>; };
>>>   file “slave/10.in-addr.arpa”;// adjust to match your local conventions.
>>>   request-ixfr no;         // only use AXFR for 10.in-addr.arpa as it is 
>>> coming from AD as IXFR does not work well.
>>>   forwarders { /* empty */ };  // use iterative resolution for the children 
>>> of 10.in-addr.arpa.
>>> };
>>> 
>>> Forwarding should NEVER be needed if servers are reachable at the IP level. 
>>>  If the solution says “configure a forward zone” it is almost always wrong.
>>> 
>>> Do the similar for the top of all other private namespaces you are using.
>>> 
>>> Mark
>>> 
>>>>> On 4 Apr 2020, at 03:06, bind-li...@iano.org wrote:
>>>> 
>>>> Hi,
>>>> 
>>>> In summary, my question is whether there is a way to configure a bind 
>>>> caching server to provide recursion in response to iterative queries for 
>>>> records in a forward type zone.
>>>> 
>>>> The background is that we have:
>>>> 
>>>> - AD domain controllers that are authoritative for all of 10.in-addr.arpa. 
>>>> in our data centers - most clients point to these for DNS resolution.
>>>> - Linux bind caching resolvers in our data centers - domain controllers 
>>>> forward to these for anything they don’t own.
>>>> - Some AWS VPCs which have been allocated subdomains of 10.in-addr.arpa. 
>>>> and are routable from our data centers. These have Route53 inbound 
>>>> endpoints which answer queries for those subdomains.
>>>> - The bind caching resolvers have forwarding rules for those subdomains to 
>>>> the AWS inbound endpoints.
>>>> 
>>>> The subdomains in our AWS VPCs have NS records, but the servers those 
>>>> point to refuse queries for records in the subdomains. The zone resolution 
>>>> is taken care of by the Route53 resolver service. The Route53 inbound 
>>>> endpoints successfully resolve queries from our data centers for those 
>>>> subdomains as long as the recursion desired flag is set to 1 in the query. 
>>>> If recursion desired is set to 0 they do not send any reply at all.
>>>> 
>>>> We want to be able to resolve PTR records in the subdomains in the AWS 
>>>> VPCs from our data centers where, as I said above, the clients point to 
>>>> the domain controllers for DNS resolution.
>>>> 
>>>> Because the AD domain controllers already own 10.in-addr.arpa, they refuse 
>>>> to allow us to configure conditional forwarding for its subdomains. So we 
>>>> delegated the subdomains to the inbound endpoints. Because they are 
>>>> delegations, the domain controllers set the recursion desired flag to 0 on 
>>>> the queries they send to the endpoints, and we are not getting replies 
>>>> from the endpoints.
>>>> 
>>>> As a workaround we tried delegating to our linux bind caching resolvers 
>>>> but we ran into the same issue, that the domain controllers set recursion 
>>>> desired to 0. As a result, when our linux caching servers have the result 
>>>> in cache, the lookup is successful, but when it would require a fresh 
>>>> lookup it gets a reply with no answers. Hence my question, is there a way 
>>>> to tell our bind caching resolvers to ignore the recursion desired flag 
>>>> and provide recursion anyway?
>>>> 
>>>> Thanks,
>>>> Maria
>>>> _______________________________________________
>>>> Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
>>>> unsubscribe from this list
>>>> 
>>>> bind-users mailing list
>>>> bind-users@lists.isc.org
>>>> https://lists.isc.org/mailman/listinfo/bind-users
>>> 
>>> -- 
>>> Mark Andrews, ISC
>>> 1 Seymour St., Dundas Valley, NSW 2117, Australia
>>> PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org
>>> 
>> 
> 

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to