Hi greg, I thank you again for your suggestions. >A.B.C.D is the address of this server? yes, It's the Bind server
I read several documents about DNS architecture My questions is about this configuration of bind: 1- according to your opinion my bind makes queries ro root server if is set no 'forwarders' option? I'll verify It by tcpdump as you suggested 2- Do you suggest to set some "forwarders" ? 3-- This bind version has root server built-in? If I removed 'named.ca' reference, Bind would use root server built-in? thanks Il giorno ven 28 giu 2024 alle ore 07:51 Greg Choules < gregchoules+bindus...@googlemail.com> ha scritto: > Hi Renzo. > > Thank you for that. The hints look OK. A bit old, but they will work. > > The first thing I would advise you to do as a matter of priority is to > upgrade BIND. > 9.11 has been end-of-life for a few years and there have been many > security fixes since then. 9.18.27 is the current version. > You could install that directly, or upgrade RHEL and obtain a more recent > packaged version. > > > You can check what BIND is doing by using "tcpdump". For example: > sudo tcpdump -n -i <interface> -c 1000 port 53 and host A.B.C.D > > I am making some assumptions: > A.B.C.D is the address of this server? > <interface> is the name of the interface the server will use for outbound > queries, according to its routeing table. I am guessing this is the > interface with address A.B.C.D? > -c stops the capture after 1000 packets. This is just a safety precaution. > port 53 and host A.B.C.D limits the capture to only packets with port 53 > (DNS) AND with the address of this interface, so you don't capture any SSH > or HTTPS etc. > > A fresh (recently restarted) DNS resolver - any one, not just BIND - will > make queries to the root to start with. It does this to learn where to go > next. It stores the results of those queries in its cache so that it > doesn't have to make them again for some time. > > There are many good books and articles available online to explain the > basics of DNS. The BIND ARM (distributed with BIND and also available > online) is the reference manual for BIND itself. > > I hope that helps. > Greg > > On Fri, 28 Jun 2024 at 05:57, Renzo Marengo <buckroger2...@gmail.com> > wrote: > >> Hi Greg, >> he info you required: >> >> 1) BIND 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.2 (Extended Support Version) >> on running on Linux x86_64 3.10.0-1160.2.2.el7.x86_64 >> 2) named.ca if file which contains root servers >> named.ca >> ---- >> . 518400 IN NS a.root-servers.net. >> . 518400 IN NS b.root-servers.net. >> . 518400 IN NS c.root-servers.net. >> . 518400 IN NS d.root-servers.net. >> . 518400 IN NS e.root-servers.net. >> . 518400 IN NS f.root-servers.net. >> . 518400 IN NS g.root-servers.net. >> . 518400 IN NS h.root-servers.net. >> . 518400 IN NS i.root-servers.net. >> . 518400 IN NS j.root-servers.net. >> . 518400 IN NS k.root-servers.net. >> . 518400 IN NS l.root-servers.net. >> . 518400 IN NS m.root-servers.net. >> >> ;; ADDITIONAL SECTION: >> a.root-servers.net. 518400 IN A 198.41.0.4 >> b.root-servers.net. 518400 IN A 199.9.14.201 >> c.root-servers.net. 518400 IN A 192.33.4.12 >> d.root-servers.net. 518400 IN A 199.7.91.13 >> e.root-servers.net. 518400 IN A 192.203.230.10 >> f.root-servers.net. 518400 IN A 192.5.5.241 >> g.root-servers.net. 518400 IN A 192.112.36.4 >> h.root-servers.net. 518400 IN A 198.97.190.53 >> i.root-servers.net. 518400 IN A 192.36.148.17 >> j.root-servers.net. 518400 IN A 192.58.128.30 >> k.root-servers.net. 518400 IN A 193.0.14.129 >> l.root-servers.net. 518400 IN A 199.7.83.42 >> m.root-servers.net. 518400 IN A 202.12.27.33 >> a.root-servers.net. 518400 IN AAAA 2001:503:ba3e::2:30 >> b.root-servers.net. 518400 IN AAAA 2001:500:200::b >> c.root-servers.net. 518400 IN AAAA 2001:500:2::c >> d.root-servers.net. 518400 IN AAAA 2001:500:2d::d >> e.root-servers.net. 518400 IN AAAA 2001:500:a8::e >> f.root-servers.net. 518400 IN AAAA 2001:500:2f::f >> g.root-servers.net. 518400 IN AAAA 2001:500:12::d0d >> h.root-servers.net. 518400 IN AAAA 2001:500:1::53 >> i.root-servers.net. 518400 IN AAAA 2001:7fe::53 >> j.root-servers.net. 518400 IN AAAA 2001:503:c27::2:30 >> k.root-servers.net. 518400 IN AAAA 2001:7fd::1 >> l.root-servers.net. 518400 IN AAAA 2001:500:9f::42 >> m.root-servers.net. 518400 IN AAAA 2001:dc3::35 >> ---- >> >> I didn't know some Bind versions had the Internet root hints built-in. >> About my configuration I understand that bind makes always queries to >> root servers ? Right? >> I'd like to re-check configuration of bind >> >> >> Il giorno gio 27 giu 2024 alle ore 22:15 Greg Choules < >> gregchoules+bindus...@googlemail.com> ha scritto: >> >>> Hi Renzo. >>> Ah OK, I had it the wrong way round. AD DNS needs to resolve names in >>> the Internet on behalf of its clients, so it forwards to BIND. >>> >>> In that case, two questions: >>> 1) What version of BIND are you running? You can get this with "named -V" >>> 2) What is in the file "named.ca"? >>> For a long time (which is why I need to know the version) BIND has had >>> the Internet root hints built in, so you don't need a hint zone anymore. >>> Unless you are defining different roots for some reason. Hence why I need >>> to know the contents of that file. >>> >>> Thanks, Greg >>> >>> >>> >>> On Thu, 27 Jun 2024 at 18:06, Renzo Marengo <buckroger2...@gmail.com> >>> wrote: >>> >>>> >>>> Hi Greg, >>>> >>>> thank you very much for your explanation. >>>> >>>> Let’s supposte AD domain was ‘my domain.it’ and I have 6000 computers >>>> of government institute. >>>> >>>> Here my bind configuration: >>>> >>>> >>>> named.conf >>>> >>>> ——— >>>> >>>> include “…. named.conf.options" ; >>>> >>>> zone "." IN { >>>> >>>> type hint; >>>> >>>> file "named.ca"; >>>> >>>> }; >>>> >>>> include “…. named.rfc1912.zones"; >>>> >>>> include “…. named.root.key"; >>>> >>>> ——— >>>> >>>> >>>> >>>> named.conf.options >>>> >>>> ——— >>>> >>>> logging { >>>> >>>> channel named_debug { >>>> >>>> syslog local6; >>>> >>>> severity debug 1; >>>> >>>> print-category yes; >>>> >>>> print-severity yes; >>>> >>>> print-time yes; >>>> >>>> }; >>>> >>>> category default { named_debug; }; >>>> >>>> }; >>>> >>>> >>>> options { >>>> >>>> auth-nxdomain no; # conform to RFC1035 >>>> >>>> allow-recursion {127.0.0.1; A.B.C.D; dc1.mydomain.it; dc2.mydomain.it; >>>> ….. } ; >>>> >>>> allow-query {127.0.0.1; A.B.C.D; dc1.mydomain.it; dc2.mydomain.it; >>>> ….. } ; >>>> >>>> recursive-clients 3000; >>>> >>>> allow-query-cache {127.0.0.1; A.B.C.D; dc1.mydomain.it; dc2.mydomain.it; >>>> ….. } ; ; >>>> >>>> >>>> listen-on port 53 { 127.0.0.1; A.B.C.D; }; >>>> >>>> directory “….. named"; >>>> >>>> dump-file “….. cache_dump.db"; >>>> >>>> statistics-file “….. named_stats.txt"; >>>> >>>> memstatistics-file “…. named_mem_stats.txt"; >>>> >>>> recursing-file “… named.recursing"; >>>> >>>> secroots-file “… named.secroots"; >>>> >>>> recursion yes; >>>> >>>> dnssec-enable no; >>>> >>>> dnssec-validation no; >>>> >>>> >>>> bindkeys-file "….. named.iscdlv.key"; >>>> >>>> managed-keys-directory "….. dynamic"; >>>> >>>> pid-file "….. named.pid"; >>>> >>>> session-keyfile "….. session.key"; >>>> >>>> ——— >>>> >>>> >>>> >>>> >Thirdly, I would not forward to AD DNS, unless the AD servers also >>>> recurse and can provide >resolution for delegated names below the AD domain >>>> >>>> >that are not hosted on the AD servers themselves. >>>> >>>> >>>> There is no forward option to AD DNS. Forward is enable from AD DNS to >>>> A.B.C.D. bind9 server. >>>> >>>> >>>> >>>> >>>> All clients are using AD DNS infact every query, about name of ‘ >>>> mydomain.it,’ is resolved from AD DNS. >>>> >>>> When client asks an external domain, e.g. www.google.it, AD server >>>> forward query to A.B.C.D. server. (Forward option is set on every domain >>>> controller) >>>> >>>> Only AD DNS make queries to A.B.C.D server and it’s necessary only to >>>> solve external domains. >>>> >>>> A.B.C.D. server never makes queries to AD server. A.B.C.D. is next dns >>>> server which partecipates when it’s necessary to resolve an external domain >>>> >>>> >>>> I hope to have explained right. >>>> >>>> I thought A.B.C.D server made query to root server because into >>>> configuration there is no reference to forward option, because I thought to >>>> set as DNS forward a government dns of my country. What do you think? >>>> >>>> I have doubts about recursive and iterative queries options too. >>>> >>>> Thanks >>>> >>>> >>>> Il giorno gio 27 giu 2024 alle ore 13:24 Greg Choules < >>>> gregchoules+bindus...@googlemail.com> ha scritto: >>>> >>>>> Hi Renzo. >>>>> Firstly, please can we see your BIND configuration and have the actual >>>>> AD domain name. >>>>> >>>>> Secondly, BIND, or any other recursive DNS server, does not 'forward' >>>>> to the root servers, unless you have configured it explicitly to do so, >>>>> which would be a bad idea and not work anyway. It will recurse >>>>> (paradoxically, perform non-recursive aka iterative queries) to the roots >>>>> and other authoritative servers. It is an important distinction to be >>>>> aware >>>>> of. >>>>> >>>>> Thirdly, I would not forward to AD DNS, unless the AD servers also >>>>> recurse and can provide resolution for delegated names below the AD domain >>>>> that are not hosted on the AD servers themselves. Personally I would use a >>>>> stub or static-stub zone in BIND to refer to the AD domain. >>>>> >>>>> In general, decide which DNS is going to do the resolving and make >>>>> that the control point, fetching data from wherever it needs to (e.g. AD >>>>> DNS) - using non-recursive queries - and using that data to construct >>>>> answers for its clients. >>>>> >>>>> I hope that helps. >>>>> Cheers, Greg >>>>> >>>>> On Thu, 27 Jun 2024 at 12:02, Renzo Marengo <buckroger2...@gmail.com> >>>>> wrote: >>>>> >>>>>> I have Active Directory domain ( 'mydomain.it' ) with 8 domain >>>>>> controllers to manage 8000 computers. Every Domain controller acts as dns >>>>>> service and resolve internal domain names while forward queries about >>>>>> external domains to another server, which Bind9 dns server (It's inside >>>>>> my >>>>>> company) >>>>>> I'm checking this Bind9 configuration (Centos server) and I see no >>>>>> forward servers so I think It makes bind9 forward queries directly to >>>>>> root >>>>>> servers. What do you think ? >>>>>> According your opinion this Bind9 server should have to forward >>>>>> requests to one or more dns server by forward option? >>>>>> >>>>>> -- >>>>>> Visit https://lists.isc.org/mailman/listinfo/bind-users to >>>>>> unsubscribe from this list >>>>>> >>>>>> ISC funds the development of this software with paid support >>>>>> subscriptions. Contact us at https://www.isc.org/contact/ for more >>>>>> information. >>>>>> >>>>>> >>>>>> bind-users mailing list >>>>>> bind-users@lists.isc.org >>>>>> https://lists.isc.org/mailman/listinfo/bind-users >>>>>> >>>>>
-- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users