It worked after appending 
do-not-query-localhost: no

On July 29, 2019 12:44:45 AM GMT+03:00, Flipchan <flipc...@riseup.net> wrote:
>Config file
>
>ns0# cat /var/unbound/etc/unbound.conf
>
># $OpenBSD: unbound.conf,v 1.7 2016/03/30 01:41:25 sthen Exp $
>
>server:
>    interface: 127.0.0.1
>    #interface: ::1
>    do-ip6: no
>
>    access-control: 0.0.0.0/0 refuse
>    access-control: 127.0.0.0/8 allow
>    access-control: 192.168.0.0/16 allow
>
>    access-control: ::0/0 refuse
>    access-control: ::1 allow
>
>    hide-identity: yes
>    hide-version: yes
>
>
>remote-control:
>    control-enable: yes
>    control-use-cert: no
>    control-interface: /var/run/unbound.sock
>
># Use an upstream forwarder (recursive resolver) for specific zones.
>#
>
>forward-zone:
>    name: "testing."
>        forward-addr: 127.0.0.1@5353 # to nsd daemon
>
>forward-zone:
>    name: "."                # use for ALL queries
>    forward-addr: 1.1.1.1
>    forward-addr: 74.82.42.42
>    forward-addr: 2001:470:20::2
>    forward-addr: 208.67.222.222
>    forward-first: yes
>
>-- 
>Sincerely flipchan
>
>On July 28, 2019 6:21:49 PM GMT+03:00, Flipchan <flipc...@riseup.net>
>wrote:
>>Thanks for the configs ! 
>>
>>https://jonwillia.ms/2018/09/23/anycast-dns-openbsd
>>(github.com/bongozone/kibble)
>>
>>I have got it to work as only either only working with my internal
>zone
>>records or working with everything else
>>
>>Unbound ignores when i put a forward-zone: name: ".testing" when i
>have
>>another forward-zone: name: "."
>>
>>Does anyone know how this could be done ? I have nsd running the zone
>>records for .testing and it works when i only have the .testing
>>forward-zone in the unbound.conf , does anyone know what im doing
>wrong
>>? 
>>
>>
>>
>>On July 27, 2019 1:35:55 AM GMT+03:00, Vijay Sankar
>><vsan...@foretell.ca> wrote:
>>>
>>>Quoting Stuart Henderson <s...@spacehopper.org>:
>>>
>>>> No - you wouldn't do it with Unbound which is a *recursive* DNS  
>>>> server, you would use an authoritative one like NSD, PowerDNS, Knot
>
>>
>>>> or BIND. All you would do with Unbound is use stub-zone to point it
>
>>
>>>> at an authoritative server.
>>>>
>>>> -- 
>>>>  Sent from a phone, apologies for poor formatting.
>>>> On 26 July 2019 11:05:44 Flipchan <flipc...@riseup.net> wrote:
>>>>> Can you link to any guides or pratical howtos on how to pratically
>
>>
>>>>> do that with unbound ?
>>>>>
>>>>> Thanks
>>>>>
>>>>>
>>>>> On July 25, 2019 9:32:29 PM GMT+03:00, Stuart Henderson  
>>>>> <s...@spacehopper.org> wrote:
>>>>> On 2019-07-25, Flipchan <flipc...@riseup.net> wrote:
>>>>>
>>>>> Greetings everyone,
>>>>>
>>>>> Does anyone have a good solution for syncing unbound configuration
>>>files?
>>>>>
>>>>>
>>>>> i have the senario where i have two internal LAN's that in two  
>>>>> different offices that need to have the same internal
>>>>> dns system for the local systems, and there is a lot of changes  
>>>>> being done in the internal zone records so i need
>>>>> a good way to sync them(the ideal way where to have a similar  
>>>>> solution like mysql's master-master replication).
>>>>>
>>>>> Both dns resolvers are running unbound on openbsd 6.5 and right
>now
>>
>>>
>>>>> the configuration file is synced with ansible.
>>>>> Does anyone have a good solution on replicating dns
>records/configs
>>
>>>
>>>>> for unbound. In the future it will be scaled
>>>>> even more so right now is a good time to implement some
>replication
>>
>>>
>>>>> for the unbound configs.
>>>>>
>>>>> Does anyone have a solution for this?
>>>>>
>>>>> There is people changing the config files on both instances so the
>
>>
>>>>> ideal way would be a replication real time sync function.
>>>>>
>>>>> Anyone got any ideas?
>>>>>
>>>>>
>>>>> Thanks in advance
>>>>> Ciao
>>>>> flipchan
>>>>>
>>>>>
>>>>> If multiple sites are updating records in the same internal zone
>at
>>>various
>>>>> times, they would probably be better off with a normal  
>>>>> authoritative DNS server
>>>>> serving that zone (with e.g. stub-zone to point unbound at it),  
>>>>> editing it in
>>>>> one place, and using normal DNS replication (zone-transfer and
>>>notify)
>>>>> to push the updates.
>>>>>
>>>>>
>>>>> --
>>>>> Sent from my Android device with K-9 Mail. Please excuse my
>>brevity.
>>>
>>>I have two locations (foretell.ca and lab.foretell.ca) and for quite
>a
>>
>>>
>>>while used NSD and Unbound. But switched to the following approach  
>>>(however my use case is very simple and my networks are small, but it
>
>>
>>>works well for me)
>>>
>>>My unbound.conf on four DNS servers have
>>>
>>>include: "/var/unbound/etc/zonedata"
>>>
>>>I then set up a simple zonedata file on one server with stuff such
>as:
>>>
>>>local-zone: "foretell.ca." static
>>>.
>>>.
>>>local-zone: "lab.foretell.ca." static
>>>.
>>>.
>>>local-zone: "0.0.10.in-addr.arpa." static
>>>.
>>>.
>>>local-zone: "3.72.10.in-addr.arpa." static
>>>.
>>>.
>>>etc. etc.
>>>
>>>Changes to zonedata reflect changes at both locations. Then I just  
>>>have a rsync process running a few times a day that does the
>>following:
>>>
>>>fr1s1.foretell.ca# more dnsupdate.sh
>>>rsync -av zonedata 10.0.0.1:/var/unbound/etc/
>>>rsync -av zonedata 10.0.0.3:/var/unbound/etc/
>>>rsync -av zonedata 10.72.3.1:/var/unbound/etc/
>>>rsync -av zonedata 10.72.3.3:/var/unbound/etc/
>>>ssh 10.0.0.1 /etc/rc.d/unbound restart
>>>ssh 10.0.0.3 /etc/rc.d/unbound restart
>>>ssh 10.72.3.1 /etc/rc.d/unbound restart
>>>ssh 10.72.3.3 /etc/rc.d/unbound restart
>>>
>>>Obviously I am not sure if this will scale for your requirements but 
>
>>>mentioning this just in case it helps.
>>>
>>>Vijay
>>>
>>>
>>>-- 
>>>ForeTell Technologies Limited
>>>59 Flamingo Avenue
>>>Winnipeg, MB, Canada
>>>R3J 0X6
>>
>>-- 
>>Sent from my Android device with K-9 Mail. Please excuse my brevity.
>
>-- 
>Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Reply via email to