Re: Determining case of REFUSED queries

2024-10-04 Thread tale via bind-users
On Thu, Oct 3, 2024 at 6:23 PM Lyle Giese via bind-users
 wrote:
> I get this:
> ; <<>> DiG 9.16.50-Debian <<>> ns socialinnovation.ca
>...
> socialinnovation.ca.3600IN  NS  dns.rebel.ca.
> socialinnovation.ca.3600IN  NS  sean.ns.cloudflare.com.
> socialinnovation.ca.3600IN  NS  kami.ns.cloudflare.com.
> socialinnovation.ca.3600IN  NS  dns2.rebel.ca.
>...>
> But a whois query for this domain only lists dns.rebel.ca and dns2.rebel.ca 
> for name servers.

The Cloudflare NSs are coming from the apex NS RRset as returned by rebel.ca.

> Wonder if the cloudflare server are not getting a good axfr from the rebel.ca 
> servers or something else is wrong.

REFUSED would tend to indicate that Cloudflare is just not configured
for the zone at all.
-- 
tale
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: qname minimization: me too :(

2024-06-25 Thread tale via bind-users
On Tue, Jun 25, 2024 at 10:42 AM Stephane Bortzmeyer  wrote:
> > Jun 25 16:18:31  conr named[4725]: lame-servers:
> >info: success resolving 'bar.foo.isc.org/A' after disabling
> >qname minimization due to 'ncache nxdomain'
>
> I do not see how this is possible ("success resolving") since the name
> does not exist and all ISC name servers reply it does not exist.
>
> And all the resolvers I tried (through RIPE Atlas) say the same. No
> "success resolving".

Admittedly "success" can be ambiguous, and in this case it means
successfully got an answer for the question that was originally being
pursued.  In this context, a negative answer is still a successful
resolution, unlike timeout or servfail from auths or various other
failures.

-- 
tale
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Observation: BIND 9.18 qname-minimization strict vs dig +trace

2024-04-24 Thread tale via bind-users
Hmm, I wonder if qname-minimisation is at issue here.   My trace dies with:

85.191.131.in-addr.arpa. 1800   IN  NS  fs838.click-network.com.
85.191.131.in-addr.arpa. 1800   IN  NS  ns102.click-network.com.
couldn't get address for 'fs838.click-network.com': not found
couldn't get address for 'ns102.click-network.com': not found
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Unable to Query DoH with `tls none` and Plain HTTP

2024-01-02 Thread tale via bind-users
On Tue, Jan 2, 2024 at 4:38 AM Jakob Bohm via bind-users
 wrote:
> Having the DoH server as a standalone process talking to DNS/TCP would
> be a solid implementation given the constant flow of changes made to
> HTTP(S) by the Big 5.

Perhaps, but for reference here is the relevant section of the DoH spec:

https://datatracker.ietf.org/doc/html/rfc8484#section-5.2

   HTTP/2 [RFC7540] is the minimum RECOMMENDED version of HTTP for use
   with DoH.

   The messages in classic UDP-based DNS [RFC1035] are inherently
   unordered and have low overhead.  A competitive HTTP transport needs
   to support reordering, parallelism, priority, and header compression
   to achieve similar performance.  Those features were introduced to
   HTTP in HTTP/2 [RFC7540].  Earlier versions of HTTP are capable of
   conveying the semantic requirements of DoH but may result in very
   poor performance.

That ISC has chosen to follow the minimum HTTP version as recommended
by the RFC is solid ground on which to be standing.

-- 
tale
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Delegation NS-records when zones share an authority server

2023-04-12 Thread tale via bind-users
it'll matter when you decide to add DNSSEC to the zone, and it's also
good hygiene in the absence of DNSSEC so that any future maintainer
can be reminded that there is a subdomain at that name when looking at
the parent.
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Intermittent issues resolving "labor.upload.akamai.com"

2023-02-08 Thread tale via bind-users
On Fri, Feb 3, 2023 at 4:32 AM Greg Choules via bind-users
 wrote:
>> From a quick look in Wireshark at what my own server (9.18.8) is doing, this 
>> looks like Akamai not responding correctly to a BIND QNAME minimisation 
>> query. Here's one response, from 95.101.36.192 for example, of many similar 
>> ones showing an issue. The response code shouldn't be REFUSED:

Definitely protocol issues going on with akamai.net.  A query for the
target in the OP, at an akamai.net auth, indicates  that there's a
zone cut at e.stor:

dig +noall +auth r33674-33729.neards.1.cftp.e.stor.lb.akamai.net
@zc.akamaitech.net
e.stor.lb.akamai.net.   4000IN  NS  n4e.stor.lb.akamai.net.
e.stor.lb.akamai.net.   4000IN  NS  n0e.stor.lb.akamai.net.
e.stor.lb.akamai.net.   4000IN  NS  n3e.stor.lb.akamai.net.
e.stor.lb.akamai.net.   4000IN  NS  n2e.stor.lb.akamai.net.
e.stor.lb.akamai.net.   4000IN  NS  n1e.stor.lb.akamai.net.

but it returns that the stor label is a lame delegation:

dig stor.lb.akamai.net @zc.akamaitech.net | awk '/status/ {print $6}'
REFUSED,

Even if lb were itself delegated, REFUSED is still the wrong answer
for stor; in that case it should get the delegation for lb.  But lb
isn't delegated either, so refused is even more wrongerer.

I'll forward this over to Akamai.
-- 
tale
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Issue Using Wildcards for Subdimain Redirecing

2022-02-17 Thread tale via bind-users
On Thu, Feb 17, 2022 at 3:34 AM muhanad  wrote:
> I have a main domain ( aa.example.com) with hunderds of subdomains ( 
> bb.aa.example.com). I made a wildcard record to forward all subdomains (bb.) 
> to a list of addresses in  round-robin fashion. The problem I am fscing is 
> the wildcard is forwarding anything towards the the IP ( example , "cc.bb." 
> which is not a vaild subdomain). How can I limit that so it will only 
> forwards ( bb.aa.example.com) and drops any invalid subdomains ( 
> cc.bb.aa.example.com ).
>
> Note: aa, bb, and cc being any arbitary value.

With a standard BIND zone, you can't.  Wildcards match multiple
labels.  That goes to the earliest days of the DNS,
https://www.rfc-editor.org/rfc/rfc1034#section-4.3.3.

You'd need a specialized handler to do this.
-- 
tale
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: DNS cache poisoning - am I safe if I limit recursion to trusted local networks?

2021-12-29 Thread tale via bind-users
On Wed, Dec 29, 2021 at 5:31 AM Danilo Godec via bind-users
 wrote:
> I have an authoritative DNS server for a domain, but I was also going to
> use the same server as a recursive DNS for my internal network, limiting
> recursion by the IP. Apparently, this is a bad idea that can lead to
> cache poisoning...

In short, no, this configuration with a BIND 9 server does not
increase your risk of cache poisoning any more than running your local
server in pure recursive mode.  I'm curious to hear more from the
source that has given you this impression.  I suspect there were some
additional qualifications that don't align with what you've described.

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Add DNS records automatically for static IP's

2021-08-09 Thread tale via bind-users
On Mon, Aug 9, 2021 at 8:46 AM Roberto Carna  wrote:
> Thanks to all of you, is it possible to use nslookup in order to
> update DNS records from Linux hosts to a Windows DNS server (not BIND)

Not nslookup, but nsupdate as Brian Cuttler said.  nslookup is purely
a query tool;
nsupdate implements the DNS Update protocol, which is one of the mechanisms
that Windows DNS server supports.

So, yes, you can go Linux -> Windows using nsupdate.

> El jue, 5 ago 2021 a las 14:14, Cuttler, Brian R (HEALTH)
> () escribió:
> > I've been using nsupdate for that.

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Add DNS records automatically for static IP's

2021-08-05 Thread tale via bind-users
On Thu, Aug 5, 2021 at 12:19 PM Roberto Carna  wrote:
> I have several hosts with static IP's / hostnames and I want to
> register them to our private BIND DNS, and they should be updated if
> the IP or hostname changes.
>
> Is there any way to do what I need ? Any Linux/Windows client to
> install in the servers in order to register IP and hostname to aour
> provate BIND ???

What you're looking for is DHCP configuration.   For example, with
ISC's DHCP server implementation you would use the "host"
statements to match clients and either assign them to a particular
static name via "fixed-address", or use "ddns-hostname" to update
DNS for the hostname with the dynamic address of the assignment.
-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: non-improving referral

2021-07-08 Thread tale via bind-users
On Thu, Jul 8, 2021 at 1:38 AM Mark Andrews  wrote:
> AA is NOT set so it is not a valid answer to the question.

Ahh that was the part that I overlooked.

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: non-improving referral

2021-07-07 Thread tale via bind-users
On Mon, Jul 5, 2021 at 8:20 PM Mark Andrews  wrote:
> This is an error with the delegation of ok.contact.  The NS records at the 
> delegation point do
> not match those at the zone apex.

I'm curious if this is a re-purposing of the existing "non-improving
referral" message.  I totally get how that brief phrase makes sense
for a sideways referral, but I'm not seeing how that statement makes
sense for ok.contact.

# Delegation for .contact
$ dig +noall +auth ns contact @a.root-servers.net
contact. 172800 IN NS demand.beta.aridns.net.au.
contact. 172800 IN NS demand.alpha.aridns.net.au.
contact. 172800 IN NS demand.delta.aridns.net.au.
contact. 172800 IN NS demand.gamma.aridns.net.au.

# Delegation for ok.contact
$ dig +noall +auth ns ok.contact @demand.alpha.aridns.net.au.
ok.contact. 86400 IN NS fwd2.dccdns.com.
ok.contact. 86400 IN NS fwd1.dccdns.com.
ok.contact. 86400 IN NS fwd4.dccdns.com.
ok.contact. 86400 IN NS fwd3.dccdns.com.

# Apex NS for ok.contact
$ dig +noall +ans ns ok.contact @fwd1.dccdns.com
ok.contact. 3499 IN NS fwd4.dns.ws.
ok.contact. 3499 IN NS fwd2.dns.ws.
ok.contact. 3499 IN NS fwd1.dns.ws.
ok.contact. 3499 IN NS fwd3.dns.ws.

Yes, the apex NS names aren't the same as the delegating NS (though
the adb addresses are), but that last one isn't a referral.

I trust you are right, Mark.  I'm just not sure what I'm missing about
"non-improving referral".
-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: REST API for recursive queries

2021-05-04 Thread tale via bind-users
On Tue, May 4, 2021 at 8:42 AM Roee Mayerowicz  wrote:
> Do you know of a way to ask multiple DNS queries in a recursive bind server 
> at the same packet\request?
> Using DoH might work? How? Is there a plugin which does that?

The short answer is no, but it might not be answering the question
you're really trying to ask.

In strict terms of what would constitute "the same request", though,
no.   While you could conceive of
a legally-formed DNS packet that had multiple questions in the
Question section, a server has no way
to acceptably indicate the proper response for all questions.  In some
cases, it might be obvious --
say, asking for the address of a.example.com and b.example.com, and
them both having addresses --
but things quickly get out of hand when you look at the problems of
indicating the many other ways
that DNS can answer, like NXDOMAIN, NODATA, or delegation.

With various forms of DNS TCP connections -- vanilla DNS, DNS over TLS
(DoT), DNS over
HTTPS (DoH) -- you can put multiple DNS request messages over the same
connection.  But that's
not quite the same as "at the same packet\request".  It also can
depend on the end points; you
might want to shove 1000 requests down a TCP connection, but server
policy might limit the
number it will actually process before terminating the link.

And plugins are specific to a particular software package.   Plugin to
what?  BIND and other major
DNS resolvers and authoritative servers support TCP technologies
natively.  The clients that talk
to them are numerous, with varying degrees of support for both TCP
initiation and multi-request
streaming.

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Getting "query failed (REFUSED) for ./IN/ANY"

2021-01-13 Thread tale via bind-users
> >Are the queries refused because of the dot (.)?  In the query log, I also
> > found some 28 IN ANY queries from 7 IPs for xxx.at.fragolina.it, which
> > probably got away with a NXDOMAIN.
>
> no. the dot is just the root domain.

Correct that . is the root domain, but I'd say the answer is a
qualified yes.  If you are not providing open recursive services and
are not authoritative for the root domain, BIND will respond with
REFUSED just like it would if someone asked you about example.com when
you're not authoritative for that.   In the old days you'd get a root
referral for authoritative resolution, but now you get a minimal
REFUSED to signal lack of authority for the question.

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: SRV Record Server Availability

2021-01-05 Thread tale via bind-users
On Tue, Jan 5, 2021 at 4:30 AM Wilfred Sarmiento via bind-users
 wrote:
> Is DNS Bind SRV record can detect the Server's availability? If yes, how?

Could you provide more information about your goal?  I don't fully
understand the question.

For my reading, the answer is basically no, in that an SRV record just
provides data about where.a particular service can be found.  It's up
to other systems to fetch that data and interpret it, including
whether that service is actually available at the given endpoint.  In
its typical operation, BIND will just take whatever name and port the
zone administrator said to provide for that SRV record, and not do any
sort of availability checks on it.

However, if you go deep into a far more complicated, custom use of
BIND, you could set up a process that monitors the availability and
changes the SRV record accordingly.
-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Weird DNS behaviour resolution issues when more labels are present in a zone

2020-12-16 Thread tale via bind-users
On Wed, Dec 16, 2020 at 3:48 AM Prasanna Mathivanan (pmathiva) via
bind-users  wrote:
> Whenever we have broken delegation as domain owners didn't follow proper RFC, 
> the default behaviour of the query hits   " _."  which 
> doesn’t exist.? And we get NXDOMAIN or SERVFAIL response.

Going back to your original example, a.b.c.example.com, qname
minimisation first identifies that there is a delegation at .com for
example.com, and then asks the example.com namesevers for
_.c.example.com.   Typically this _.c.example.com query would come
back with either an NXDOMAIN answer, which means that the queried
nameserver believes it is authoritative for all names within
c.example.com, or it comes back with a NOERROR answer that lists a
delegation in the authority section.

In the first case (NXDOMAIN), the resolver knows it can ask the same
servers about _.b.c.example.com and the cycle repeats.  In the latter
case, the resolver is able to distinguish between whether there was a
delegation for c.example.com (and ask the new nameservers about
_.b.c.example.com) or a delegation that's actually at _.c.example.com
(highly unusual, in which case, ask the original example.com
nameservers about _.b.c.example.com).

Getting a SERVFAIL throws a wrench in all this.  It's the
authoritative server basically saying, "I'm badly broken and can't
tell you how."  Generally this means the resolver should ask the next
server in the authoritative list.  If they're all giving SERVFAIL then
the resolver can either try to work around the brokenness (for
example, by querying the full name at its closest enclosing
delegation) or just give up on the SERVFAIL.

-- 
tale

PS: While thinking about this I realized a weird case, which is if
only a subset of the parent nameservers are authoritative for a
subdomain.  That is, imagine example.com is served by the four servers
ns{1,2,34}.example.com, but c.example.com is delegated only to
ns{1,2}.example.com.  If you ask ns1 or ns2 about _.c.example.com,
they'll give an authoritative answer and the fact that a delegation
exists wouldn't be identified (absent DNSSEC), but asking ns3 or ns4
would give the delegation to ns1 and ns2.  I can't think of how this
might be a real problem for future queries though, outside of the
usual type of brokenness that can happen even with full name queries
(eg, a parent has a subdomain configured that it isn't actually
delegated to it).
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: forwarders used in order or based on RTT ?

2020-10-16 Thread tale via bind-users
On Fri, Oct 16, 2020 at 10:22 AM Matus UHLAR - fantomas
 wrote:
>> On 16.10.20 09:56, Bob Harold wrote:
> >The BIND ARM (9.16.2) says:
> >"There may be one or more forwarders, and they are queried in turn until
> >the list is exhausted or an answer is found."
> >
> >But [an old mailinglist post] says:
> >"Forwarders are selected based on an RTT(round-trip-time)-based algorithm"
> >
> >So which is correct?
>
> both are. The ARM does not say they are queried in defined order.
> The order is defined by RTT

To be fair, the ARM strongly implies in its context that it's the
order you put them in the list.

The ARM discrepancy has already been noted by ISC, but the first bug
report in the long long ago on it was never really fixed.They
raised the issue again internally a few months ago and so I would
anticipate that the ARM will be fixed in a not too distant release.

https://gitlab.isc.org/isc-projects/bind9/-/issues/2030
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Do not cache certain domains

2020-09-10 Thread tale via bind-users
On Mon, Sep 7, 2020 at 6:01 PM Ben Lavender  wrote:
> Without having to alter the TTL of the existing RRs as well as the
> default TTL. I know this can be done using cache-max-ttl to limit the
> whole cache, but can this be done for say one single or multiple defined
> domains only?

AFAIK there's no specially designed way to handle this, so achieving it will
basically mean cobbling some parts together.

max-cache-ttl is usable in a view statement, and each view by default gets its
own cache.

With the caveat that this might not be the best way and I haven't
actually tested it,
I'd try this.  Set up a view that bound a listener to an interface
alias on your host,
and inside that view clamp down max-cache-ttl however you like.   Back in your
main configuration set up the zone(s) to forward to that private listener.

I think even on the first hit, the TTL that your main resolver sees
will be the one
that got clamped in the view resolver, but I'm not positive about that.

You will also get double the number of cache entries for each lookup, of course.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Reverse lookup response format

2020-08-25 Thread tale via bind-users
> Instead of the way it is now:
> # nslookup 192.168.2.206
> 206.2.168.192.in-addr.arpa  name = 
> server1.ctois.local.2.168.192.in-addr.arpa.

In your zone file be sure that the name that is the target of the PTR
records has a final dot.   Without the trailing dot, the names are
interpreted as relative to the current origin.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Error "Query section mismatch : got"

2020-08-19 Thread tale via bind-users
On Wed, Aug 19, 2020 at 7:42 AM Matus UHLAR - fantomas
 wrote:
> again, why you query for 250.0-24.199.212.125.in-addr.arpa
> under normal circumstances there's no point of querying that name.
>

Well yes and no.   While an individual user would typically not,
resolvers sure will.  While trying to resolve
250.199.212.125.in-addr.arpa, it will eventually get to
250.199.212.125.in-addr.arpa CNAME 250.0-24.199.212.125.in-addr.arpa.
 Then it will need to resolve the canonical name, and a response like
the original one that was shown will be clearly buggy.

I say "possibly" because from my vantage, all three of
ns{,1,2}.viettelidc.com.vn, the authorities for
0-24.199.212.125.in-addr.arpa, are giving fine answers right now (on
udp; blocked on tcp).   This includes the originally reported problem
IP, 115.84.177.8

-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: /etc/bind.keys in a chrooted environment

2020-07-22 Thread tale via bind-users
On Wed, Jul 22, 2020 at 11:05 AM Anand Buddhdev  wrote:
> There is no harm in copying the file into the chroot. It will get rid of
> the warning.

With the caveat that you have to be sure that if you keep the original
copy outside of the chroot, you have to be sure updates get reflected
inside the chroot.

NAMED_CONF_INCLUDE_FILES mentioned in the OP seems to be a SuSE-ism
and I didn't dig into whatever bearing it might have for maintenance
of the chroot.
-- 
tale
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Debian/Ubuntu: Why was the service renamed from bind9 to named?

2020-07-20 Thread tale via bind-users
On Sun, Jul 19, 2020 at 7:06 AM @lbutlr  wrote:
> On 17 Jul 2020, at 11:56, Ted Mittelstaedt  wrote:
> > In fact, the ONLY reason that the name "bind9" was ever even coined
> > at all was because the changes from bind8 both in the syntax of the
> > config file and how the program operated they wanted to boot admins
> > in the behind to get them to change their config files.
>
> This. Exactly this.

Well, one minor bit of clarification is important.  While highlighting
the significant change in software might have been the motivation for
why some installers chose to go with the name bind9 in place of named
in some contexts, it was also a major design goal of BIND9 that it
could run as a drop-in replacement for BIND8 on most configurations.
It achieved this goal.  The basic syntax was unchanged and
configuration behavior was largely the same but for a little bit
around the edges.

And for what it's worth, not all systems moved away from "named" to
"bind9".  I've been running FreeBSD for decades, and I can't remember
ever calling the service "bind9".
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users