Name servers cannot be cnames. The DNS protocol cannot be made to
work reliably when they are CNAMEs without changing the definition
of glue and the additional section processing rules. CNAME records
are NOT added as glue, A and are added as glue.
ns1.oregonisonline.net. 3600IN CN
We're having a very similar problem to the thread "question about how a
particular dig works ...", in that "dig +trace" works and "dig" doesn't
(which implies a problem with the local resolving named).
This particular story is that someone didn't get a domain renewed in
time (the oregonisonline.ne
On Mon, 17 Sep 2012, Evan Hunt wrote:
Does anyone use dnssec-signzone with -x? If so, can you check/tell me
your DNSKEY RRset?
I just tested it with "dnssec-signzone -Sx example.com" and
"dnssec-signzone -x example.com", on 9.9.2 and 9.7.4, and it worked
as expected in all cases.
Were you si
On 9/18/2012 12:59 PM, M. Meadows wrote:
Thanks Kevin. I understand how the chained alias works. Sorry, I
didn't explain my question very well.
I can see that the 8.8.8.8 google public dns server gets an answer.
I know that this domain has a cname coexisting with an SOA record and
NS record
Thanks Kevin. I understand how the chained alias works. Sorry, I didn't explain
my question very well.
I can see that the 8.8.8.8 google public dns server gets an answer.
I know that this domain has a cname coexisting with an SOA record and NS
records ... both of which I have read are a bad t
Lightner, Jeff wrote:
>
> For example from my workstation if I search an internal domain we use I
> know which internal DNS server it goes to ask the question. That DNS
> server in turn may refer to a separate internal DNS server which is
> authoritative for the domain or has the record cached.
On 9/18/2012 9:45 AM, M. Meadows wrote:
dig www.careerone.com.au +short @8.8.8.8
www.careerone.com.au.edgesuite.net.
a903.g.akamai.net.
208.44.23.99
208.44.23.121
Why does the above dig work when
dig careerone.com.au +nssearch @8.8.8.8
SOA dns0.news.com.au. hostmaster.news.com.au. 2012082200 3
I know that dig +trace can be used to see the path of name resolution starting
from root server down to final answer.
What I’m wondering is if there is some set of options that would go from
workstation to final answer? That is to say only go to the root server if
that is where the DNS topolo
Why / how does this work?
dig -t any www.careerone.com.au @ns2.tmpw.net.
; <<>> DiG 9.3.6-P1-RedHat-9.3.6-20.P1.el5_8.2 <<>> -t any www.careerone.com.au
@ns2.tmpw.net.
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15513
;; flags: qr aa rd; QUER
On Tue, Sep 18, 2012 at 10:43:47AM -0400, M. Meadows wrote:
> And as you point out it has a cname at the apex ... which I thought
> was not allowed.
named will not accept it, and indeed, it is a violation of DNS
standards. Other DNS implementations might allow it, however.
> Isn't it true that
Very helpful. Thank you. I was not expecting a subdomain by that name.
And as you point out it has a cname at the apex ... which I thought was not
allowed.
Isn't it true that a cname record can't co-exist with any other record in a
zone file?
So if the soa record in the zone file is for www
On 18 Sep 2012, at 14:45, M. Meadows wrote:
> dig www.careerone.com.au +short @8.8.8.8
> www.careerone.com.au.edgesuite.net.
> a903.g.akamai.net.
> 208.44.23.99
> 208.44.23.121
>
> Why does the above dig work when
If you try
dig +trace www.careerone.com.au
you'll find that t
dig www.careerone.com.au +short @8.8.8.8
www.careerone.com.au.edgesuite.net.
a903.g.akamai.net.
208.44.23.99
208.44.23.121
Why does the above dig work when
dig careerone.com.au +nssearch @8.8.8.8
SOA dns0.news.com.au. hostmaster.news.com.au. 2012082200 3600 1200 86400 1200
from server usw1.ak
On Tue, Sep 18, 2012 at 08:31:13PM +0800,
pangj wrote
a message of 12 lines which said:
> do you know what dns software is used by cloudflare?
I don't know.
> and how they defend the DDoS against DNS?
http://blog.cloudflare.com/65gbps-ddos-no-problem
___
Hello,
do you know what dns software is used by cloudflare?
and how they defend the DDoS against DNS?
thanks.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
bind-users mailing list
bind-users@lists.is
15 matches
Mail list logo