I used to use "dlint" for this, but the package no longer builds easily
- is there any equivalent package as dig is not ideal to find what the
problem actually is?

BillK


On 27/08/13 19:53, Alan McKinnon wrote:
> On 27/08/2013 12:30, Grant wrote:
>> I use a fairly well-known (free) DNS provider.  I just checked my DNS
>> settings at dnscheck.pingdom.com and I got:
>>
>> 1. No SOA record was found when querying the name server. This is most
>> probably due to a misconfiguration at the name server - a zone must
>> have a SOA record.
>>
>> 2. Nameserver * does not do DNSSEC extra processing.
>>
>> Are either of these something to worry about?
> 
> 
> Yes. Without an SOA record you don't actually have a zone.
> 
> You should stop using those crappy dns checker sites, they tend to be
> full of shit, unreliable and operate off someone's idea of how DNS
> should be instead of reading the actual RFCs on the matter. Our abuse
> team has long ticket lists from people trusting those sites and now
> think there's something with how we do glue. Hint: Our glue is right and
> proper :-)
> 
> 
> Instead just use dig, using google.com as an example get the NS records
> first:
> 
> $ dig ns google.com +short
> ns3.google.com.
> ns2.google.com.
> ns1.google.com.
> ns4.google.com.
> 
> 
> Then query each of those name server in turn directly for the SOA:
> 
> $ dig soa google.com +short @ns3.google.com
> ns1.google.com. dns-admin.google.com. 2013081400 7200 1800 1209600 300
> 
> That's a correct SOA record.
> 
> What could have happened with that test site is the query timed out and
> the site assumed the universe was therefore about to explode. Use such
> if you want but always verify the results yourself using dig.
> 
> The DNSSEC message is not a problem. It means your provider does not use
> DNSSEC. Again, the universe will not explode from this, we all got along
> just fine with plain unsigned DNS transfers for 30 years. DNSSEC is a
> way to digitally sign zone transfers and updates. Nothing to do with
> zone resolution.
> 


Reply via email to