my resolv.conf looks like
nameserver 10.10.10.10
nameserver 10.10.10.20
search path1.mydomain.com path2.mydomain.com
I would expect if I type the following:
dig myhost
It would search for that host in path1 or path2 listed above. It does not, a
+trace shows the resolver querying the root
I've a system with two interfaces; a management and a data interface. My
default route is set out to the data interface.
doing a
dig +tcp someIP.com @some.resolver
works fine.
If I want a UDP based query, I have to specify -b option and provide IP of the
interface otherwise it fails.
Thanks to all that replied. I think the solution I want to pursue is to
integrate AD 2012 DNS with BIND. Talk about bleeding edge huh??
From: Tony Finch
To: Marc Lampo
Cc: John Williams ; bind-users@lists.isc.org
Sent: Monday, July 2, 2012 11:10 AM
will
not allow that. That would be ideal though.
Thanks,
JT
From: Marc Lampo
To: 'John Williams' ; bind-users@lists.isc.org
Sent: Friday, June 29, 2012 3:07 AM
Subject: RE: BIND, DNSSEC & AD
Hello,
(not a Bind related question !)
Last ti
I have an environment that hosts a BIND based internet facing domain, call it
abc.com. I also have an internal Active Directory instance that hosts a MS
based DNS instance called abc.com as well. Everything works fine until we
decided to implement DNSSEC on Active Directory.
Here is my questi
In theory, you would use views to serve up different data to subnets. For
example, you may want to show your internal clients one set of IP addresses
while the external world see's a subset of that data. That is a perfect
utilization of views.
You may want to setup different instances of BIND
--- On Tue, 8/9/11, Chris Buxton wrote:
> From: Chris Buxton
> Subject: Re: DNSSEC and MS AD
> To: "John Williams"
> Cc: bind-users@lists.isc.org
> Date: Tuesday, August 9, 2011, 5:00 PM
> On Aug 9, 2011, at 9:13 AM, John
> Williams wrote:
>
> > M
My company (as many) run Microsoft Active Directory internally and we use BIND
for our Internet DNS presence. We have had our domain singed for some time.
Now I've been tasked to look into Signing our AD implementation. MS has their
own version of DNSSEC for their DNS but my question is would
>From my signed domain when I query www.isc.org (w/ +dnssec) I get the ad flag
>as expected. I don't see that flag when I query whitehouse.gov (w/ +dnssec)
>and I know that zone is signed.
Is anyone else seeing this behavior? Also, is there a link that addresses
troubleshooting or diagnosing
If I have a Linux host with multiple IP's, is there a way to utilize the DIG
command such that the query appears like it's coming from different IP
addresses?
So If I have 10 virtual IP's, is there a way to control the source IP of the
query?
I've referenced the DIG man page and it doesn't app
I'm being told there is an RSA verification failure on the .US domain. I''m
getting details from the following; http://dnsviz.net/d/us/dnssec/ I have a
signed zone under us. How does this affect my domain and other signed zones
under .US?
___
11 matches
Mail list logo