Hi all,
I wonder if anyone can help me to find the cause of the problem I am currently
having. I am playing with BIND on my lab environment. The configuration is
using views and what I want to achieve is having the same domain name be
resolved differently depending on the query source. For exam
Hi, I have a statement in my recursive resolver (rr-server) similar to this:
zone "example.org" { type forward; forward only; forwarders {
10.64.1.1; 10.64.1.2; } ; };
When clients ask for "aaa.example.org" I would expect it to send the
same query to one of the IPs above and return the answer to
In message <20161006205713.ga1...@danton.fire-world.de>, Sebastian Wiesinger wr
ites:
> Hello,
>
> is there a guide for an algorithm rollover with BIND9 for an
> inline-signed zone? I want to roll from RSA to ECDSA but I'm unable to
> find a good guide for it. I already looked at the ISC DNSSEC G
So an item of note that I noticed is that the "quick start" guide:
http://www.threatstop.com/sites/default/files/threatstop_quickstart_guide.pdf
is more about getting the ThreatSTOP interface configured than an actual BIND
DNS server. It might be the day that I am having but it sure was a slog
Hello,
is there a guide for an algorithm rollover with BIND9 for an
inline-signed zone? I want to roll from RSA to ECDSA but I'm unable to
find a good guide for it. I already looked at the ISC DNSSEC Guide but
it doesn't seem to cover that the RRSIGs made by the new keys need to
be published befor
i have a scenario in which bind appears to be caching data that i wouldn't have
expected it to, which is breaking resolution after it occurs. i have a stub
zone configured on server foo:
zone "example.com" {
type stub;
masters {
"example.com" ;
};
};
mas
Hi All, just wanted to let you know that ThreatSTOP's DNS Firewall for BIND
has just been released and evaluations are available at the below link, we
would like to invite you to test it out.
https://www.threatstop.com/index.php?page=index&action=trial
DNS Firewall policies can be custom created
7 matches
Mail list logo