On 2008-05-07, Sam Fourman Jr. <[EMAIL PROTECTED]> wrote:
> here is my trouble, if i use nslookup from a computer that is set to
> use my name server(ns.wiscdns.com)
> my output is as follows:
>
> Sam# nslookup 12.192.128.135
> Server:               12.192.128.131
> Address:      12.192.128.131#53
>
> 135.128.192.12.in-addr.arpa   name = pop3.DigitalDataWeb.Com.

If I query your server directly I get that too. 

> however if I change my name server to a local ISP (that I do not use
> for service)
>
> my output is as follows
>
> Sam$ nslookup 12.192.128.135
> Server:               209.103.196.2
> Address:      209.103.196.2#53
>
> ** server can't find 135.128.192.12.in-addr.arpa: NXDOMAIN

Your ISP has not delegated or CNAMEd 135.128.192.12.in-addr.arpa
to direct people doing the lookups to contact your server. Using
dig, compare a query for 135.128.192.12.in-addr.arpa ANY with
a query for 1.128.192.12.in-addr.arpa ANY.

Since you are in a subnet that is not on an exact byte boundary
(/8 /16 /24) the normal way is to ask your ISP to configure CNAMEs,
with your /25 you will probably get CNAMEs like this:

128.128/25.128.192.12.in-addr.arpa.
129.128/25.128.192.12.in-addr.arpa.
130.128/25.128.192.12.in-addr.arpa.
131.128/25.128.192.12.in-addr.arpa.
132.128/25.128.192.12.in-addr.arpa.
..you get the picture..

and you will then have to configure named to answer authoritatively
for 128/25.128.192.12.in-addr.arpa, and set your PTR up in that zone
instead, like:

135.128/25.128.192.12.in-addr.arpa. CNAME pop3.DigitalDataWeb.com.

> I assume that if I want to host email for 10 different domains I have
> to have these set
>
> allow-recursion { any; };

This allows anybody to use your nameserver as a resolver (e.g.
anyone can ask you to lookup domains for them). You shouldn't
do this at all without a very good reason (one example being if
you're providing DNS to VPN clients and filtering non-VPN traffic).
Doing so without other controls leaves you open to being an
attack amplifier for anyone who can send a UDP packet with an
invalid source address, and also may open you up to DNS poisoning.

If you're currently using a setup that involves the same IP
address for both authoritative (domains you host) and recursive
queries (client DNS requests), you should get these split onto
separate addresses.

> auth-nxdomain yes;

I haven't used bind for authoritative dns for a while, but I don't
think this makes a difference for domains you're authoritative
for. AIUI it just forces "authoritative answer" to be set on any
NXDOMAIN response, even if you're not authoritative for that
domain.

> I am open to any suggestions anyone has, because this is my first set
> of BSD based name servers

This isn't OS-specific, it's just that Windows DNS server tends
to do a bunch of things that it doesn't show you so you don't
get to see what's happening.

Reply via email to