On Wed, Aug 22, 2012 at 01:23:12PM +0530, DN Singh wrote:
> I never realized that I had this issue too. But, after running
> the tests, I found out that my queries were indeed blocked by
> spamhaus.
> 
> So, I changed the servers as pointed out and bingo, spam was 
> successfully being blocked.
> 
> Thanks /dev/rob0

Hehe, glad to hear it! And best of all, from someone with the 
initials, "DNS"! ;)

Many people think that using forwarders rather than recursion is 
somehow more effective or "net-green" (conserving of the network 
resources provided by others.) It's really not, and it carries an 
added risk of external cache poisoning.

If you query a record from a forwarder, and the forwarder has it 
cached, yes, you get a quick response from said forwarder. But you 
get a cached record, which means the TTL is ticking away. You get, on 
average, half the published TTL, which means you'll do, on average, 
twice the number of queries.

If you query a record from a forwarder, and the forwarder does NOT 
have it cached, you have introduced extra latency in getting your 
reply whilst the forwarder recurses. (But you end up with the full 
TTL minus the latency.)

Google Public DNS seems to look up records again before the TTL 
expires in their cache, so you are indeed likely to see a slight 
improvement in your DNS response time without the doubling of your 
external queries, when using their service. But is that in any way 
something you could call "net-green"? Since they're ignoring the 
published TTL, I think not.

Other benefits of running your own nameserver, not to be overlooked: 

1. You're shielded from the impact of decisions of greedy business 
types who don't understand DNS. Every so often one of them gets the 
idea to replace NXDOMAIN responses with an IP address pointing to 
their own web server. For a mail server doing DNSBL/DNSWL lookups, 
the result of that can only be a disaster. And it can happen at any 
time. Lots of ISPs do this, and they usually won't warn you in 
advance of such a change.

2. You are in control of your own DNSSEC policy. You can strictly 
validate all signatures, you can allow expired signatures, or you can 
choose to ignore DNSSEC altogether. If a zone you know exists 
suddenly comes up as SERVFAIL, you know what to check. Conversely, if 
DNS for a signed zone is hijacked while you are checking signatures, 
you are not going to fall for the bogus data.

3. You control your own cache. If you are aware of cached data being 
wrong, you can flush that data and move ahead; whereas you cannot 
flush your forwarder, and you have to wait for the TTL to expire. 
"Propagation" is a myth propagated by and for people who don't 
understand DNS.

I go for one nameserver per site, or at a bigger site, maybe two.
-- 
  http://rob0.nodns4.us/ -- system administration and consulting
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

Reply via email to