On Wed, Aug 22, 2012 at 01:23:12PM +0530, DN Singh wrote: > I never realized that I had this issue too. But, after running > the tests, I found out that my queries were indeed blocked by > spamhaus. > > So, I changed the servers as pointed out and bingo, spam was > successfully being blocked. > > Thanks /dev/rob0
Hehe, glad to hear it! And best of all, from someone with the initials, "DNS"! ;) Many people think that using forwarders rather than recursion is somehow more effective or "net-green" (conserving of the network resources provided by others.) It's really not, and it carries an added risk of external cache poisoning. If you query a record from a forwarder, and the forwarder has it cached, yes, you get a quick response from said forwarder. But you get a cached record, which means the TTL is ticking away. You get, on average, half the published TTL, which means you'll do, on average, twice the number of queries. If you query a record from a forwarder, and the forwarder does NOT have it cached, you have introduced extra latency in getting your reply whilst the forwarder recurses. (But you end up with the full TTL minus the latency.) Google Public DNS seems to look up records again before the TTL expires in their cache, so you are indeed likely to see a slight improvement in your DNS response time without the doubling of your external queries, when using their service. But is that in any way something you could call "net-green"? Since they're ignoring the published TTL, I think not. Other benefits of running your own nameserver, not to be overlooked: 1. You're shielded from the impact of decisions of greedy business types who don't understand DNS. Every so often one of them gets the idea to replace NXDOMAIN responses with an IP address pointing to their own web server. For a mail server doing DNSBL/DNSWL lookups, the result of that can only be a disaster. And it can happen at any time. Lots of ISPs do this, and they usually won't warn you in advance of such a change. 2. You are in control of your own DNSSEC policy. You can strictly validate all signatures, you can allow expired signatures, or you can choose to ignore DNSSEC altogether. If a zone you know exists suddenly comes up as SERVFAIL, you know what to check. Conversely, if DNS for a signed zone is hijacked while you are checking signatures, you are not going to fall for the bogus data. 3. You control your own cache. If you are aware of cached data being wrong, you can flush that data and move ahead; whereas you cannot flush your forwarder, and you have to wait for the TTL to expire. "Propagation" is a myth propagated by and for people who don't understand DNS. I go for one nameserver per site, or at a bigger site, maybe two. -- http://rob0.nodns4.us/ -- system administration and consulting Offlist GMX mail is seen only if "/dev/rob0" is in the Subject: