--- Begin Message ---
As others have noted, the source address of queries to your gslb nameservers 
hosting the subzone gslb.example.br.com will be from the recursive resolver 
used by clients - not the source address of server that owns parent 
example.br.com (unless those nameservers are also functioning as recursive 
resolver for your clients).

If the source addresses of the recursive resolvers do not suffice for the 
policy on your gslb nameserver for identifying location of user, you may want 
to explore use of EDNS Client Subnet (ECS).    If the client resolvers support 
ECS, they can/will include the subnet of the originating DNS request and pass 
to your gslb nameservers as part of the request.  This requires that the 
resolvers used by clients and the authoritative gslb nameserver both support 
ECS.



From: dns-operations <dns-operations-boun...@dns-oarc.net> on behalf of daniel 
majela <dmaj...@gmail.com>
Date: Tuesday, February 27, 2024 at 07:27
To: Lyle Giese <l...@lcrcomputer.net>
Cc: dns-operations@lists.dns-oarc.net <dns-operations@lists.dns-oarc.net>
Subject: Re: [dns-operations] BIND9 and ADNS
Lyle. . . . Talvez colocar essa subzona em cada servidor DNS também possa 
resolver. Eu vou tentar fazer isso. muito obrigado. Em seg. , 26 de fev. de 
2024 às 20: 07, Lyle Giese <lyle@ lcrcomputer. net> escreveu: My understanding 
of DNS protocols
ZjQcmQRYFpfptBannerStart
ZjQcmQRYFpfptBannerEnd
Lyle.... Talvez colocar essa subzona em cada servidor DNS também possa 
resolver. Eu vou tentar fazer isso. muito obrigado.

Em seg., 26 de fev. de 2024 às 20:07, Lyle Giese 
<l...@lcrcomputer.net<mailto:l...@lcrcomputer.net>> escreveu:

My understanding of DNS protocols and the end user's OS is that it is 
programmed with 2 or 3(usually) recursive DNS servers to query for all of the 
end user's needs. And that the recursive DNS follows the trail of DNS to find 
the answer the end user needs.  In which case the end users ip address is never 
going to hit or ask your load balancer any questions.

The only way I can think of is to segregate those that need to query for that 
sub-zone by the recursive DNS server they are allowed to use and give that 
subset of recursive DNS servers that ability to query that sub-zone.

Lyle Giese
On 2/26/24 15:09, daniel majela wrote:
Hey guys. I have "n" DNS servers on the network. I would like to configure a 
sub-zone that I will not publish on the network. Example would be: 
example.com.br<https://urldefense.com/v3/__http:/example.com.br__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdWPjcbg8$>
 and my subzone would be 
gslb.exemplo.com.br<https://urldefense.com/v3/__http:/gslb.exemplo.com.br__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdmzYMq3M$>.
 On the server that owns the 
gslb.exemplo.com.br<https://urldefense.com/v3/__http:/gslb.exemplo.com.br__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdmzYMq3M$>
 sub-zone, which is an ADNS balancer, I will add some targeting policies based 
on the origin IP. The problem is that the IP address that calls gslb is the 
server that owns the 
example.com.br<https://urldefense.com/v3/__http:/example.com.br__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdWPjcbg8$>
 zone and not the user's IP address and this way the policy will not work. I 
need the IP of the user's revolver to reach my ADNS and not the IP of the 
Resolver that owns 
exemplification.com.br<https://urldefense.com/v3/__http:/exemplification.com.br__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdaFmF84c$>.
 If anyone has a tip and if there is a solution, I would appreciate it.



--
Daniel Majela Galvão
http://br.linkedin.com/pub/daniel-souza/6/1b1/774<https://urldefense.com/v3/__http:/br.linkedin.com/pub/daniel-souza/6/1b1/774__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdapJLTgs$>

(55-012) - 9-8201-9885
(55-012) - 9-9761-1511
(55-012) - 32076909



_______________________________________________

dns-operations mailing list

dns-operations@lists.dns-oarc.net<mailto:dns-operations@lists.dns-oarc.net>

https://lists.dns-oarc.net/mailman/listinfo/dns-operations<https://urldefense.com/v3/__https:/lists.dns-oarc.net/mailman/listinfo/dns-operations__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6Kde-p27Kc$>
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net<mailto:dns-operations@lists.dns-oarc.net>
https://lists.dns-oarc.net/mailman/listinfo/dns-operations<https://urldefense.com/v3/__https:/lists.dns-oarc.net/mailman/listinfo/dns-operations__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6Kde-p27Kc$>


--
Daniel Majela Galvão
http://br.linkedin.com/pub/daniel-souza/6/1b1/774<https://urldefense.com/v3/__http:/br.linkedin.com/pub/daniel-souza/6/1b1/774__;!!KUqw_ieqaw8!4deAe4VGTQuzlYbKdRxyIsheGfklZno4j2wbHVqOCaXhYqWPIC30UOhB4HYvHm9_lqgjI5HTT6KdapJLTgs$>

(55-012) - 9-8201-9885
(55-012) - 9-9761-1511
(55-012) - 32076909

--- End Message ---
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to