Hello,
I am running an important subzone of .museum zone (which implements both DNSSec
and IDN) and I have a strange behavior going on…
Some requests seems not to be resolved correctly with certain operators…
One out of six requests are not resolved correctly.
Instead of giving the answer
Can you provide the domain name and an example of the problem?
That will help in identifying the issue.
On 8/03/10 11:21 AM, bsd b...@todoo.biz wrote:
Hello,
I am running an important subzone of .museum zone (which implements both
DNSSec and IDN) and I have a strange behavior going on
On 3/7/10 10:46 AM, Danny Mayer wrote:
Autokey is not a cryptographic signature protocol. It *is* a
authentication protocol for the server only and there are a number of
exchanges that need to be done to complete the authentication of the
server. You cannot compare this with DNSSEC and nothing
Date: Mon, 08 Mar 2010 10:03:26 -0800
From: Michael Sinatra mich...@rancid.berkeley.edu
Sender: bind-users-bounces+oberman=es@lists.isc.org
On 3/7/10 10:46 AM, Danny Mayer wrote:
Autokey is not a cryptographic signature protocol. It *is* a
authentication protocol for the server
Hi, I would like to implement a server for an internal business business unit
to restrict recusion for only domains white listed by IT. Can anyone share a
config for a similar implementation.
thanks
Tom
___
bind-users mailing list
Hi,
For whitelisting a set of domains via their netblocks to allow recursion FROM
them, the allow-recursion statement is your friend. For a filtering setup,
which I think is what you want to achieve, a web proxy is much more suitable.
An internal root would allow you to such things via DNS,
On 3/8/2010 2:29 PM, Joe User wrote:
Hi, I would like to implement a server for an internal business business unit
to restrict recusion for only domains white listed by IT. Can anyone share a
config for a similar implementation.
Why do you think it's preferable to return a referral,
7 matches
Mail list logo