Re: Mixing Algorithms for DNSSEC

2011-10-16 Thread Phil Mayers
On 10/15/2011 08:32 PM, Mark Elkins wrote: So what you are saying in practical terms is in order to migrate from RSASHA1 to RSASHA256, wait for the next needed creation of a ZSK (which cycle once a year) and then at exactly the same time start using RSASHA256 on the KSK's (which cycle every mont

Re: Mixing Algorithms for DNSSEC

2011-10-16 Thread Mark Elkins
On Sun, 2011-10-16 at 12:13 +0100, Phil Mayers wrote: > On 10/15/2011 08:32 PM, Mark Elkins wrote: > > > > So what you are saying in practical terms is in order to migrate from > > RSASHA1 to RSASHA256, wait for the next needed creation of a ZSK (which > > cycle once a year) and then at exactly the

Re: CNAME record for the root of the domain

2011-10-16 Thread Niccolò Belli
I'm sorry but I still didn't understand if it's possible to do it with some workaround, and if yes HOW to do it. Thanks, Niccolò ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list

DNS Sinkhole in BIND

2011-10-16 Thread babu dheen
Hi,    Can anyone help me how to setup DNS Sinkhole in BIND on Linux 32 bit edition.   Regards babu___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https:/

Re: BIND/named on VM

2011-10-16 Thread Danny Mayer
On 10/14/2011 1:49 PM, Walter Smith wrote: > Hello folks, > > I would like to setup latest BIND/named [slaves] within VMware > environment - is there any implications I should be aware of? > Since I saw some issues running NTPd on VMware - thinking may be 'named' > might have similar issues... Na

Re: CNAME record for the root of the domain

2011-10-16 Thread Kevin Oberman
2011/10/16 Niccolò Belli : > I'm sorry but I still didn't understand if it's possible to do it with some > workaround, and if yes HOW to do it. No, you can' have a CNAME at the top of a zone. A zone requires an SOA and CNAMEs cannot co-exist with ANY other record. Depending on exactly what you ar

Re: DNS Sinkhole in BIND

2011-10-16 Thread TCPWave Customer Care
Babu The following example defines two access control lists and uses an options statement to define how they are treated by the nameserver: acl black-hats { 10.0.2.0/24; 192.168.0.0/24; }; acl red-hats { 10.0.1.0/24; }; options { blackhole { black-hats; }; allow-q