Re: Selective forwarding from an internal only name server

2016-08-18 Thread S Carr
On 18 August 2016 at 02:07, Barry Margolin wrote: > That's why Cloudflare's method is "RFC-compliant", but what MS is doing > with sharepoint.com is not. Microsoft's DNS implementation allows CNAMEs at the zone apex, correct it's not RFC compliant, but this is Microsoft... ___

Re: Selective forwarding from an internal only name server

2016-08-18 Thread S Carr
On 18 August 2016 at 01:04, anup albal wrote: > Does that mean I setup another forwarding zone called microsoft.com or > sharepoint.microsoft.com or both? Ideally you should setup a completely separate caching/forwarding server and not be using the external DNS box (NS1) for this purpose. On the

Re: OPenssl 1.1 and Bind

2016-08-18 Thread The Doctor
Vin?cius Ferr?o wrote: : OpenSSL 1.0 will continue to be supported. There's no rush to go to 1.1 release. : I can't see this as an issue. Tell us that when openssl 1.0 starts to disappear. : Sent from my iPhone : > On Aug 17, 2016, at 23:38, The Doctor wrote: : > : >> On Thu, Aug 18, 2016

RE: Selective forwarding from an internal only name server

2016-08-18 Thread Darcy Kevin (FCA)
As I read it, you have to buy the "flattening" as an extra service from CloudFlare. Their default is to give CNAME at the apex, intentionally violating RFCs. What a concept: charging extra for RFC-compliance.

RE: Selective forwarding from an internal only name server

2016-08-18 Thread Darcy Kevin (FCA)
Well, the cost/benefits/risks of separating authoritative and recursive on different *servers* (as opposed to different NICs, views, or whatever) is actually a hotly-debated topic among experts. I know some non-DNS-expert opinions, from the InfoSec side of the house, consider hardware-level sep

Spurious DNSKEY records on slave

2016-08-18 Thread Jim Fenton
I recently switched from external signing of my zone to use of BIND 9.9 inline signing. While things went fairly smoothly on the master server, my slave ended up with a bunch of spurious DNSKEY records that came from my previous keys (I generated new keys when I went to inline signing). The extra

Re: OPenssl 1.1 and Bind

2016-08-18 Thread Mark Andrews
In message , The Doctor writes: > Vin?cius Ferr?o wrote: > : OpenSSL 1.0 will continue to be supported. There's no rush to go to 1.1 rel > ease. > > : I can't see this as an issue. > > Tell us that when openssl 1.0 starts to disappear. It was mostly accessor functions were missing which I wasn

DNS views setup help

2016-08-18 Thread Brian Pugh
I am running bind 9.8.2 on a pair of RHEL 6 DNS servers.. One server is the master, one is the slave. My goal is to setup 2 views so that our internal folks can resolve hostnames to internal IP's while still allowing our external customers to resolve from the outside. Both of these servers are exte

Re: DNS views setup help

2016-08-18 Thread Mathew Ian Eis
I think you are pretty close. One detail that you appear to be missing are is in the linked document: server 10.0.1.1 { /* Deliver notify messages to external view. */ keys { external-key; }; }; Your slaves should have a similar statement in each view with the IP of the master and the relevant

Re: DNS views setup help

2016-08-18 Thread project722
That is correct, as I have not setup the TSIG keys yet. Also, I am still a bit confused on how this code should be implemented in my conf file. In the example you posted that refers back to the link, where would I place it in the context of my views on the master? Do I only need that one stanza on

Re: Problem looking up domain dryfire.com

2016-08-18 Thread Reindl Harald
Am 16.08.2016 um 11:04 schrieb Eivind Olsen: I'm seeing some odd problems where BIND (9.10.4-P2) has issues resolving getsurfed.com. This is when using the "510 Software Group" BIND 9.10 for RHEL/CentOS/Fedora. why do you use a 3rd party package? no problem here with bind-9.10.4-1.P2.fc24.x8

Re: OPenssl 1.1 and Bind

2016-08-18 Thread Alan Clegg
On 8/18/16 12:32 AM, Vinícius Ferrão wrote: > OpenSSL 1.0 will continue to be supported. There's no rush to go to 1.1 > release. > > I can't see this as an issue. You've never dealt with "The Doctor" before, have you? signature.asc Description: OpenPGP digital signature __

bind used as resolver: matching the source ip

2016-08-18 Thread pm8...@t-online.de
Dear all, As far as I understand, BIND is not only used for authoritative name servers, but is also often used as a (recursive) resolver. When receiving a response to a DNS query, does BIND match the source ip of the response to the destination ip of the query and discard the response if they

Re: Spurious DNSKEY records on slave

2016-08-18 Thread Alan Clegg
On 8/18/16 1:29 PM, Jim Fenton wrote: > The extra DNSKEY records were not present in the zone file of the master > server, so I reinitiated a zone transfer and this did not help. I > checked the signed zone file on the master with named-checkzone and only > the desired DNSKEY records were there.

Re: bind used as resolver: matching the source ip

2016-08-18 Thread Mukund Sivaraman
On Thu, Aug 18, 2016 at 11:27:01AM +0200, pm8...@t-online.de wrote: > Dear all, > > As far as I understand, BIND is not only used for authoritative name > servers, but is also often used as a (recursive) resolver. > When receiving a response to a DNS query, does BIND match the source ip of > th

Re: Problem looking up domain dryfire.com

2016-08-18 Thread Mark Andrews
In message <9f949ee6-6386-c986-698e-e4a46e6cf...@thelounge.net>, Reindl Harald writes: > Am 16.08.2016 um 11:04 schrieb Eivind Olsen: > > I'm seeing some odd problems where BIND (9.10.4-P2) has issues resolving > > getsurfed.com. This is when using the "510 Software Group" BIND 9.10 for > > RHEL/