> Why not configure regular nameserver on the same host as
> opendnssec instead of replicating full functionality in
> opendnssec itself?

Well...  This may at least partly stem from my local wishes for
deployment.  I wanted to not touch the current originating name
server, and continue to maintain the zones there, and use
OpenDNSSEC as a "bump on the wire" between the now hidden master
and the new distribution master name server.

In other words, I wanted to use "DNS in", and at the same time
"DNS out" for transferring respectively unsigned and signed
zones.  After all, that is supposed to be a supported feature,
now, with 1.4?

If I want to use the "DNS in" adapter, it seems to me that
OpenDNSSEC lays claim to port 53, so that presents an additional
challenge if you want to run a real name server in parallel with
OpenDNSSEC.  (Even though you can configure the signer to listen
to another port than 53, I don't immediately see a way for me to
configure BIND to send notify messages to another port than port
53.)  This quickly devolves into a kludge on top of another
kludge, which I am trying my best to avoid.

I'm not sure being able to query for SOA for the incoming zone or
reply to a SOA query for the outgoing zone needs to be as
complicated as implementing a full name server.  After all, it is
already today listening for and sending notify messages.  But
then again, what do I know...

Best regards,

- Håvard
_______________________________________________
Opendnssec-user mailing list
Opendnssec-user@lists.opendnssec.org
https://lists.opendnssec.org/mailman/listinfo/opendnssec-user

Reply via email to