"Lawrence K. Chen, P.Eng." <lkc...@ksu.edu> wrote:

Hmmm, so that explains what I'm seeing in my logs of my nameservers
getting hammered by AD.

Should I be worried?  Is there anything that could be done on my end to
help reduce the impact?

----

On our campus, we have always allowed delegation of subdomains to
department nameservers, with the requirement that we be secondary to
them.  Some departments also have other domains on their nameservers,
again have us as their secondary (and often we're the only published
nameservers for these domains.)

But, AD was different...they did their own thing.

Except there's this problem now with their authoritative servers also
being open recursive query resolvers ... exposed to the whole world.

Since they won't turn off recursion (and there's no way to limit its scope)

So, we've started pushing that they need to use us as secondaries.

Right now it has only been tested with Central AD, where I'm seeing one
DC sending updates ranging from a few minutes to a few hours.  While the
other DC is trying at intervals of 2-9 minutes, but its N-1....

Though when they were first trying to get it going...they had some
trouble, which turned out that it thought the IP space of my nameservers
belonged to it and that my nameservers were not part that space.

Namely, one of my DNS vlans is 129.130.254.0/28 (ns-1.ksu.edu lives
here, ns-2.ksu.edu/ns-3.ksu.edu live in the other one)...where some
other portion of the /24 is a vlan that they have servers in.

Hmmm, I noticed in the dump of ads.ksu.edu, it has A records for my
nameservers....is that a problem?


Where I used to work, there was NO computer that had an AD DNS
Server address in its TCP/IP configuration.  ALL computers
used the two BIND internal servers for their DNS resolution.
The Domain Controllers were NOT accessible from the Internet,
so we were not worried about Internet access to those DC DNS
Servers.  Only one sub-domain was completely DHCP-dynamic and mastered
on a Windows DC DNS, so with the exception of this forward zone and its
five /24 reverse zones, the only zones on the Windows DCs were the
AD zones - _msdcs, _sites, _tcp, and _udp.  The forward and reverse
zones were on the BIND servers only, and all these "_" zones were
slaved on the BIND servers.

--Barry Finkel

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to