Have seen some anycast DNS implementations using more than one address, some
times even on the same subnet, any considerations or reasons for doing that? ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
b
In message , Wolfgang N
agele writes:
> Hi Rob,
>
> VeriSign contact as the operator of g.gtld-servers.net in CC.
>
> I think your resolver is noticing the right thing here. When running multip=
> le queries against this server I occassionally receive a response that inde=
> ed has no signatures
Hi Rob,
VeriSign contact as the operator of g.gtld-servers.net in CC.
I think your resolver is noticing the right thing here. When running multiple
queries against this server I occassionally receive a response that indeed has
no signatures:
$ dig @192.42.93.30 google.com +dnssec +norec
; <<>
On Tue, Feb 28, 2012 at 06:28:54PM +, Evan Hunt wrote:
> > the one that bites us most often is that of the expired RRSIG. If
> > we could log that but go ahead and accept the data, most of the
> > pain would stop.
>
> BIND has this: "dnssec-accept-expired yes;" Note that it opens you
> to r
In message , michoski writes:
> > Doing DNSSEC verification in 2012 is lopsided the other way. You
> > cannot resolve the names you need sometimes. You're probably not
> > receiving any actual protection from spoofing.
>
> I feel similarly. I do see risk in the non DNSSEC world (thanks to Kamins
Stub zones record the NS list and associated address records for
the zone. Think of it as pre-populating the cache.
Forwarder clauses override the normal recusive resolution process.
A empty forwarders clause disables the override for names at or
below the "zone" it appears in.
These are indepe
Original Message
Subject: Re: Configuring a domain slave to look up subdomain hosts
From: Chris Buxton
Date: Tue, February 28, 2012 4:58 pm
To: Mike Bernhardt
Cc: bind-users@lists.isc.org
Sorry, my mistake. Apparently, it needs t
Sorry, my mistake. Apparently, it needs to be overridden (disabled) in each
affected zone, not just at the domain apex.
If you leave out the stub zones entirely and disable forwarding in the parent
zones, it should work. That way, the server is simply following delegations,
rather than relying
Hello all,
Recently I’ve started getting numerous errors in my logs of the form:
Feb 24 15:12:50 server named[3511]: validating @0xb8976b78: com SOA: got
insecure response; parent indicates it should be secure
Feb 24 15:12:50 server named[3511]: error (no valid RRSIG) resolving
'google.com/DS
So, it seems that the stub zone only works as I expected if I disable ALL
forwarding- not just in the parent zone but also in global options. Is that
the expected behavior for a stub zone? It's not consistent with what you
said below.
_
From: Mike Bernhardt [mailto:bernha...@bart.gov]
Forwarding was disabled for the parent zone, but it still didn't work.
That's why I asked the question. I was doing one or the other, and trying to
get rid of forwarding to the domain master. I have it on in global options
because we don't let internal name servers go to the root; they forward to
o
Perhaps this article from the ISC knowledge base will help:
https://kb.isc.org/article/AA-00302/47/I-want-to-forward-all-DNS-queries-from-my-caching-nameserver-to-another-server-but-configure-exceptions-for-some-domains-how.html
Confidentiality Notice:
This electronic message and any attachme
Why not set up the zone with its own forward statement like this:
zone "subdomain.example.com" {
type forward;
forwarders { 10.172.2.50; 10.172.2.51; };
forward only;
};
--
bind-users-bounces+wbrown=e1b@lists.isc.org wrote on 02/28/2012
01:04:46 PM:
> I am simply
On Feb 28, 2012, at 10:04 AM, Mike Bernhardt wrote:
> Yes, you are confused J
>
> I am simply trying to get the domain slave to make queries for hosts in the
> subdomain which is hosted on other servers, instead of forwarding the queries
> to the domain master. I thought a stub zone would faci
> I suppose there are different classes of failures; unfortunately on
> the resolver, there is only one result, SERVFAIL, to cover all. It
> would be better if there was a way to distinguish the "oops, admin
> bungled DNSSEC" errors from the ones which are more likely to be
> indicative of spoo
On 2/28/12 9:26 AM, "/dev/rob0" wrote:
> On Tue, Feb 28, 2012 at 01:16:16PM +0100, Marc Lampo wrote:
>> First of all : I do not deny DNSSEC adds a challenge for administrators.
>> They must understand that adding this additional SECurity aspect,
>> will generate extra work (keygeneration/re-genera
Yes, you are confused :-)
I am simply trying to get the domain slave to make queries for hosts in the
subdomain which is hosted on other servers, instead of forwarding the
queries to the domain master. I thought a stub zone would facilitate this by
giving my server the lookup information it nee
Original Message
Subject: RE: Configuring a domain slave to look up subdomain hosts
From: "Mike Bernhardt"
Date: Tue, February 28, 2012 10:15 am
To: , "'Mark Andrews'"
So it sounds like in this case, stub
On Tue, Feb 28, 2012 at 01:16:16PM +0100, Marc Lampo wrote:
> Please allow a, partly/mostly, non-technical feedback
> as security officer for a tld (.eu)
>
> First of all : I do not deny DNSSEC adds a challenge for administrators.
> They must understand that adding this additional SECurity aspect
So it sounds like in this case, stub zones don't buy me anything? What I
wanted was for this secondary to query the subdomain name servers directly
instead of relying on the domain primary via forwarding. Is making this
server a secondary for the subdomain the only way?
_
From: Nex6 [m
Please allow a, partly/mostly, non-technical feedback
as security officer for a tld (.eu)
First of all : I do not deny DNSSEC adds a challenge for administrators.
They must understand that adding this additional SECurity aspect,
will generate extra work (keygeneration/re-generation/signing and
re
21 matches
Mail list logo