bind classless slave from microsoft dns classful SOA?

2013-07-12 Thread Michael Hare

Bind-users;

I have been asked to slave a /24 from a microsoft SOA, however, their 
authority for the /24 is false in that they really only have authority 
to 192/26.


Am I correct in that there is no way to slave said zone 
[x.y.z.in-addr.arpa] but serve it as a different zone 
[192/26.x.y.z.in-addr.arpa] without relying on some outside scripts to 
do the translation?


For what it's worth, I am running the 9.8X series of BIND.

Thanks-
-Michael
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


.mil resolution problems?

2010-10-25 Thread Michael Hare

Hello-

Our recursive nameservers are having trouble with .MIL today.  I see 
some public servers [8.8.8.8] are not.  I am not running a dns-sec 
enabled recursive resolver.


In the below I was expecting an 'ADDITIONAL' section, not based on the 
DIG header, but based on expecting delegation glue.  A dig for the 
NIPR.MIL NS times out.


Anyone else having problems or can perhaps point me in the right direction?

Thanks-
-Michael

[...@trigger ~]$ dig MIL NS

; <<>> DiG 9.7.0-P2 <<>> MIL NS
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6544
;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;MIL.   IN  NS

;; ANSWER SECTION:
MIL.69821   IN  NS  EUR2.NIPR.MIL.
MIL.69821   IN  NS  PAC2.NIPR.MIL.
MIL.69821   IN  NS  EUR1.NIPR.MIL.
MIL.69821   IN  NS  PAC1.NIPR.MIL.
MIL.69821   IN  NS  CON1.NIPR.MIL.
MIL.69821   IN  NS  CON2.NIPR.MIL.

;; Query time: 0 msec
;; SERVER: 128.104.254.254#53(128.104.254.254)
;; WHEN: Mon Oct 25 15:56:40 2010
;; MSG SIZE  rcvd: 140
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


general: error: socket.c:1577: unexpected error:

2009-08-17 Thread Michael Hare
I recently [8/1/2009] upgraded to 9.5.1P3.  Last evening there were two 
brief moments that the named process was not resolving out of cache. 
This is a recursive only server that is basically opened to all clients, 
mostly for historical reasons.  The named process recovered on its own.


While I have seen references to old bugs/issues
https://lists.isc.org/mailman/htdig/bind-users/2005-January/055224.html

This seems to be something different.  We're [still] on Red Hat 
Enterprise Linux AS release 3.  Any advice on what to investigate?


Thanks-
-Michael

Aug 17 01:24:53 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:24:53 named[20688]: general: error: internal_send: 
144.92.162.225#57060: Invalid argument
Aug 17 01:24:53 named[20688]: client: warning: client 
144.92.162.225#57060: error sending response: invalid file
Aug 17 01:24:53 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:24:53 named[20688]: general: error: internal_send: 
216.180.219.44#11059: Invalid argument
Aug 17 01:24:53 named[20688]: client: warning: client 
216.180.219.44#11059: error sending response: invalid file

...
...
Aug 17 01:25:17 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:25:17 named[20688]: general: error: internal_send: 
143.215.143.11#32833: Invalid argument
Aug 17 01:25:17 named[20688]: client: warning: client 
143.215.143.11#32833: error sending response: invalid file
Aug 17 01:25:17 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:25:17 named[20688]: general: error: internal_send: 
128.104.22.33#57369: Invalid argument
Aug 17 01:25:17 named[20688]: client: warning: client 
128.104.22.33#57369: error sending response: invalid file
Aug 17 01:25:57 named[20688]: general: warning: checkhints: unable to 
get root NS rrset from cache: not found




Aug 17 02:38:54 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:38:54 named[20688]: general: error: internal_send: 
144.92.166.12#9500: Invalid argument
Aug 17 02:38:54 named[20688]: client: warning: client 
144.92.166.12#9500: error sending response: invalid file
Aug 17 02:38:54 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:38:54 named[20688]: general: error: internal_send: 
144.92.166.12#14442: Invalid argument
Aug 17 02:38:54 named[20688]: client: warning: client 
144.92.166.12#14442: error sending response: invalid file

...
...
Aug 17 02:39:23 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:39:23 named[20688]: general: error: internal_send: 
202.108.181.80#50110: Invalid argument
Aug 17 02:39:23 named[20688]: client: warning: client 
202.108.181.80#50110: error sending response: invalid file
Aug 17 02:39:23 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:39:23 named[20688]: general: error: internal_send: 
202.108.181.80#37064: Invalid argument
Aug 17 02:39:23 named[20688]: client: warning: client 
202.108.181.80#37064: error sending response: invalid file

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: general: error: socket.c:1577: unexpected error:

2009-08-20 Thread Michael Hare

Hello again-

Our issue is now appearing on multiple physical nameservers in our 
domain running 9.5.1-P3.


The second server that is noticing this is Red Hat Enterprise Linux 
Server release 5.3 (Tikanga) 64 bit, complied 9.5.1-P3 from src with 
default configure options.  So the problem seems to persist across 
vastly different linux environments [the first server we saw this on was 
Redhat AS 3].


I am not a heavy duty programmer but my understand based on src is that 
this may be related to the inability to send a UDP response and is 
perhaps a resource exhaustion issue.  I'm not sure what ISC_R_NRESULTS 
'invalid file' is trying to tell me.  As before, the server seems to 
recover, but DNS resolution does stop for about a minute.


-Michael

Michael Hare wrote:
I recently [8/1/2009] upgraded to 9.5.1P3.  Last evening there were two 
brief moments that the named process was not resolving out of cache. 
This is a recursive only server that is basically opened to all clients, 
mostly for historical reasons.  The named process recovered on its own.


While I have seen references to old bugs/issues
https://lists.isc.org/mailman/htdig/bind-users/2005-January/055224.html

This seems to be something different.  We're [still] on Red Hat 
Enterprise Linux AS release 3.  Any advice on what to investigate?


Thanks-
-Michael

Aug 17 01:24:53 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:24:53 named[20688]: general: error: internal_send: 
144.92.162.225#57060: Invalid argument
Aug 17 01:24:53 named[20688]: client: warning: client 
144.92.162.225#57060: error sending response: invalid file
Aug 17 01:24:53 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:24:53 named[20688]: general: error: internal_send: 
216.180.219.44#11059: Invalid argument
Aug 17 01:24:53 named[20688]: client: warning: client 
216.180.219.44#11059: error sending response: invalid file

...
...
Aug 17 01:25:17 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:25:17 named[20688]: general: error: internal_send: 
143.215.143.11#32833: Invalid argument
Aug 17 01:25:17 named[20688]: client: warning: client 
143.215.143.11#32833: error sending response: invalid file
Aug 17 01:25:17 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 01:25:17 named[20688]: general: error: internal_send: 
128.104.22.33#57369: Invalid argument
Aug 17 01:25:17 named[20688]: client: warning: client 
128.104.22.33#57369: error sending response: invalid file
Aug 17 01:25:57 named[20688]: general: warning: checkhints: unable to 
get root NS rrset from cache: not found




Aug 17 02:38:54 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:38:54 named[20688]: general: error: internal_send: 
144.92.166.12#9500: Invalid argument
Aug 17 02:38:54 named[20688]: client: warning: client 
144.92.166.12#9500: error sending response: invalid file
Aug 17 02:38:54 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:38:54 named[20688]: general: error: internal_send: 
144.92.166.12#14442: Invalid argument
Aug 17 02:38:54 named[20688]: client: warning: client 
144.92.166.12#14442: error sending response: invalid file

...
...
Aug 17 02:39:23 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:39:23 named[20688]: general: error: internal_send: 
202.108.181.80#50110: Invalid argument
Aug 17 02:39:23 named[20688]: client: warning: client 
202.108.181.80#50110: error sending response: invalid file
Aug 17 02:39:23 named[20688]: general: error: socket.c:1577: unexpected 
error:
Aug 17 02:39:23 named[20688]: general: error: internal_send: 
202.108.181.80#37064: Invalid argument
Aug 17 02:39:23 named[20688]: client: warning: client 
202.108.181.80#37064: error sending response: invalid file



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Feature request - disable internal recursion cache

2009-10-30 Thread Michael Hare
For those of us that are still running auth and recursive on the same 
IP, I believe the benefit would be to deploy a best practices recursive 
only nameserver on a different machine/IP address without getting, in my 
case, possibly hundreds of thousands of clients to change their DNS 
resolver IP address.


In the surface, I too find this to be an interesting idea.

-Michael

Kevin Darcy wrote:

Dmitry Rybin wrote:

Niall O'Reilly wrote:


I think, that be useful make this feature in bind:
Add option to disable internal recursion cache, and forward all 
recursive queries to another daemon.


Daemon as unbound, pdns-recursor - much faster in recursion queries, 
that bind. :(


I don't see the point.

If you need some code, other than BIND named, to handle
recursive queries from your clients, why not just have
that code listening on the addresses configured in the
stub resolver on each of the client systems?



I'll explain, why.
Same Server is authoritative for internet/intranet and recursive for 
intranet and one large AS. Sometimes Auth/Rec server IP cannot be 
spited into different IP's.


Bind answer authoritative for all clients, and forward (if allowed) 
recursive queries to recursive server.

___
Why not just point some or all of those recursive clients to the "other" 
recursive resolver?


Seems like BIND ceases to add any value when it's just forwarding 
everything and not caching any results.


- Kevin

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Feature request - disable internal recursion cache

2009-10-31 Thread Michael Hare
Well, except then you need to update all of your delegations. That can 
not only be an administrative hassle, but can also get very expensive, 
especially if you have hundreds of them in ccTLDs, where you have to pay 
your "in-country agent" a fee for every registry change. It's quite a 
racket.


You don't have to change all the domain registrations.  You just have to 
change the A records of the nameserver names.  Hopefully you haven't 
done something silly like use different nameserver names for each domain.


Updating the adns A records is great but this doesn't automatically 
change firewall rulesets.  I can't control what kind of good or bad 
assumptions folks that we are secondaries for made.


I think we can agree that it can be a lot of effort to break auth and 
recursive into two IPs no matter what route you go.


I agree that using adns for rdns proxy is suboptimal but sometimes the 
lower cost engineering solutions in practice are just as good as the 
painful ones.


I mostly threw my hat in the ring so that it would be known that more 
than one BIND user could benefit from a feature like this.


-Michael
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Bind Clustering

2010-04-08 Thread Michael Hare
Doesn't DDNS rely on a single SOA?  If so, is there a best practice on 
how to deal with this?


-Michael

On 4/8/2010 9:15 AM, Stephane Bortzmeyer wrote:

On Thu, Apr 08, 2010 at 01:18:33PM +0200,
  Arnoud Tijssen  wrote
  a message of 14 lines which said:


Since everything nowadays is dependant on DNS I would like to
cluster my primary server in case of a hardware failure or error.


Why? I really do not see your point. You have three authoritative name
servers (the master and two slaves), presumably in different
locations. Isn't it enough? If no, you can still add slaves.


So, how do I setup two primary bind servers that keep each other in
sync one way or the other.


Slaves keep in synch automatically.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: root.hind or named.hint file update

2016-09-24 Thread Michael Hare
Agreed, using outdated built in hints and diligent logging does cause a minor 
annoyance (minor as it can be filtered after verifying the incident), so there 
is merit in updating even if automatic updates might not make sense.  For 
example, an unfiltered log from a production resolver of ours would like to say 
the following :)

21-Sep-2016 00:01:02.859 general: warning: checkhints: l.root-servers.net/ 
(2001:500:9f::42) missing from hints
21-Sep-2016 00:01:02.859 general: warning: checkhints: l.root-servers.net/ 
(2001:500:3::42) extra record in hints
21-Sep-2016 00:01:03.580 general: warning: checkhints: l.root-servers.net/ 
(2001:500:9f::42) missing from hints
21-Sep-2016 00:01:03.580 general: warning: checkhints: l.root-servers.net/ 
(2001:500:3::42) extra record in hints
21-Sep-2016 00:01:05.102 general: warning: checkhints: l.root-servers.net/ 
(2001:500:9f::42) missing from hints
21-Sep-2016 00:01:05.102 general: warning: checkhints: l.root-servers.net/ 
(2001:500:3::42) extra record in hints
21-Sep-2016 00:01:05.174 general: warning: checkhints: l.root-servers.net/ 
(2001:500:9f::42) missing from hints
21-Sep-2016 00:01:05.174 general: warning: checkhints: l.root-servers.net/ 
(2001:500:3::42) extra record in hints
21-Sep-2016 00:01:06.087 general: warning: checkhints: l.root-servers.net/ 
(2001:500:9f::42) missing from hints

-Michael

-Original Message-
From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Matus 
UHLAR - fantomas
Sent: Friday, September 23, 2016 7:32 AM
To: bind-users@lists.isc.org
Subject: Re: root.hind or named.hint file update

>Pol Hallen  wrote:
>>
>> is it recommend put a cron script for auto-update root.hind and named.hint 
>> db?

On 23.09.16 12:54, Tony Finch wrote:
>No, it's best not to have a hints file and just use the one built in to BIND.

i would not say that... it's better to use builtin hints file than having
outdated hints file.

But if someone does care about hints file, it's better to have current
version, when the builtin one is older.


-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
- Have you got anything without Spam in it?
- Well, there's Spam egg sausage and Spam, that's not got much Spam in it.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Enforce EDNS

2017-02-08 Thread Michael Hare
+1 to Alan.  While I work at an ivory tower and support Mark's mission, in 
practice I don't have operational time (nor is it necessarily the best use of 
my time) to maintain a per-ip bypass.

100% in support of enabling this by default as long as their as an option to 
disable.

-Michael

> -Original Message-
> From: bind-users [mailto:bind-users-boun...@lists.isc.org] On Behalf Of Mark
> Andrews
> Sent: Tuesday, February 07, 2017 4:32 PM
> To: Reindl Harald 
> Cc: bind-us...@isc.org
> Subject: Re: Enforce EDNS
> 
> 
> In message <4b0243b1-1c89-023b-f3f3-7279216d5...@thelounge.net>, Reindl
> Harald
> writes:
> >
> >
> > Am 07.02.2017 um 22:11 schrieb Mark Andrews:
> > > In message <3836f038-c480-9970-fd53-a5c87ad36...@thelounge.net>,
> Reindl Har
> > ald wr
> > > ites:
> > >>> Break them.  That's the only way it will eventually get fixed
> > >>
> > >> if things would be that easy
> > >>
> > >> the admins of the broken servers ar the very last which are affected,
> > >> admins with a recent named have to bite the bullet of user terror and
> > >> users typically don#t give a damn when it worked yesterday
> > >>
> > >> the admins of the broken server don't give a damn about as long they can
> > >> point their fingers and say "look, the rest of the world has no lookup
> > >> errors"
> > >>
> > >> if it would be that easy the problem of spam would not exist for many
> > >> years while in reality you waste most of our time to write exceptions
> > >> here and there, disable rules or score them lower because you are not in
> > >> the position to educate every admin of sending servers out there
> > >
> > > You go over the admins head.  You go to the board of directors.
> > > You go the the minister responsible (yes, I have had to do that
> > > along with a copy to the shadow minister and the company that the
> > > DNS was outsourced to for government domains).  Good old snail mail
> >
> > if *you* do that from your position it may work but still takes time in
> > a world where it somestimes takes days and weeks to find somebody who
> > can instruct a admin to change a simple CNAME record from machine A to
> > machine B even with the directors OK and CC'ed in the message
> 
> And you can fix the issue by hand while this is going on.
> 
>   server 74.113.204.34 { send-cookie false; };
>   server 74.113.206.34 { send-cookie false; };
>   server 117.56.91.203 { send-cookie false; };
>   server 117.56.91.204 { send-cookie false; };
>   server 117.56.91.234 { send-cookie false; };
>   server 199.252/16 { send-cookie false; };
> 
>   (or request-sit no; for 9.10.x)
> 
> There aren't lots of servers that drop EDNS or drop EDNS + DNS COOKIE.
> 
> The big numbers are those that drop EDNS(1) which no one is using at
> this stage.  See http://ednscomp.isc.org/
> 
> > i doubt it works the same way for a ordinary admin in a small company
> > where you to make it work because *you* broke it with the named update
> > and so your advise will be "roll back that stuff to the state of
> > yesterday where it worked and no you have not the free time to call each
> > and every company and educate them"
> >
> > problem here is that as long it's not a critical mass anybody who
> > deployed the update breaking things have to bleed for it and so you have
> > to find enough people with the power to go over admins head *before* the
> > breaking updates
> >
> > and no, when in your company people can't work because DNS is broken you
> > don't call foreign admins and directors - you have to fix that *now* and
> > after you have fixed it you have no longer arumgents why call somebody
> > with no direct relations
> > ___
> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to 
> > unsubscribe
> >  from this list
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from
> this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


need another pair of eyes: edu/net (educause?) glue issues?

2017-10-18 Thread Michael Hare
Hello-

Sorry for the wide blast (and long email), but perhaps some fellow .edu's can 
help us through this one.

I'm one of the DNS admins for wisc.edu.  An academic group on campus has 
noticed an issue with the atecentral.net delegation, for which two of the 
listed NS are on campus.

[]$ dig atecentral.net NS +short
dns2.scout.wisc.edu. <- on campus
dns.scout.wisc.edu.  <- on campus
dns.axisdata.com.

wisc.edu is authoritative for scout.wisc.edu and return the following correct A 
records

[]$ dig scout.wisc.edu NS +short | sort 
adns1.doit.wisc.edu.
adns2.doit.wisc.edu.
adns3.doit.wisc.edu.

adns1.doit.wisc.edu:dns.scout.wisc.edu. 14400   IN  A   144.92.170.201
adns2.doit.wisc.edu:dns.scout.wisc.edu. 14400   IN  A   144.92.170.201
adns3.doit.wisc.edu:dns.scout.wisc.edu. 14400   IN  A   144.92.170.201

adns1.doit.wisc.edu:dns2.scout.wisc.edu.14400   IN  A   
144.92.170.203
adns2.doit.wisc.edu:dns2.scout.wisc.edu.14400   IN  A   
144.92.170.203
adns3.doit.wisc.edu:dns2.scout.wisc.edu.14400   IN  A   
144.92.170.203

[]$ dig @144.92.170.201 atecentral.net NS +short
dns.axisdata.com.
dns.scout.wisc.edu.
dns2.scout.wisc.edu.

It appears that there is some bad glue "somewhere" and I'm having trouble 
finding where it is coming from.

dig +norecurse @b.gtld-servers.net atecentral.net NS
...
...
;; ADDITIONAL SECTION:
dns.axisdata.com.   172800  IN  A   162.255.164.103
dns.scout.wisc.edu. 172800  IN  A   144.92.170.199  
< WRONG
dns2.scout.wisc.edu.172800  IN  A   144.92.170.200 
< WRONG

note: local admins have enabled DNS servers on 170.199 and 170.200 as a short 
term measure until this can be resolved, so if you dig against those incorrect 
IPs directly you will get an answer (for now).

We have asked the scout.wisc.edu folks to check the atecentral.net delegation 
and received the following response:  "...  I checked with Namecheap, where 
atecentral.net is registered, and they say that the glue record values are 
supplied to the root nameservers by the registrar for the top-level domain 
where the names are located (wisc.edu, in this case, so Educause/VeriSign) "

And this matches my memory as well.  As recent as June 2017 when an NS inside a 
.edu was also the NS for another domain (for example, a .org), wearing my 
wisc.edu DNS admin hat I would log into the educause domain portal and 
add/update glue, the production example being uwhealth.org which has NS inside 
the wisc.edu namespace.

My suspicious is that the glue stuck in gtld is supplied by educause however 
educause (who recently went through a major facelift of their portal, 
net.educause.edu) is claiming no such thing has ever existed.  I'm not 
convinced, but there is an off chance early senility is setting in.  I have a 
screenshot from June 2017 (without URL, unfortunately) of our list of "glue" 
from what I'm 99% sure is the old net.educause.edu portal however educause is 
claiming adamantly (yes, we have escalated a ticket) that my screenshot is not 
from their old portal.

I see other screenshots on the web of the old net.educause.edu website that 
shows basically the same design theme (color) as my screenshot.  You'll note my 
screenshot from June 2017 from "somewhere" has the wrong IPs for 
dns.scout.wisc.edu and dns2.scout.wisc.edu.

ours: https://stats.uwsys.net/educause-maybe.jpg
found on web: 
https://image.slidesharecdn.com/edu-dnssec-151026011336-lva1-app6891/95/edu-dnssec-testbed-27-638.jpg?cb=1445822096

For info from an old thread related to a similar thing we did at wisc.edu ~10 
years ago: https://arstechnica.com/civis/viewtopic.php?f=10&t=97332, but I 
digress.
 
I can't dump the .edu zonefile and educause (for now) is denying culpability.  
My 'dig' foo is weak enough that I can't come up with a damning output to know 
where to go from here.  Any ideas?

-Michael
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users