>> I use a fairly well-known (free) DNS provider.  I just checked my DNS
>> settings at dnscheck.pingdom.com and I got:
>>
>> 1. No SOA record was found when querying the name server. This is most
>> probably due to a misconfiguration at the name server - a zone must
>> have a SOA record.
>>
>> 2. Nameserver * does not do DNSSEC extra processing.
>>
>> Are either of these something to worry about?
>
> Yes. Without an SOA record you don't actually have a zone.
>
> You should stop using those crappy dns checker sites, they tend to be
> full of shit, unreliable and operate off someone's idea of how DNS
> should be instead of reading the actual RFCs on the matter. Our abuse
> team has long ticket lists from people trusting those sites and now
> think there's something with how we do glue. Hint: Our glue is right and
> proper :-)
>
> Instead just use dig, using google.com as an example get the NS records
> first:
>
> $ dig ns google.com +short
> ns3.google.com.
> ns2.google.com.
> ns1.google.com.
> ns4.google.com.
>
> Then query each of those name server in turn directly for the SOA:
>
> $ dig soa google.com +short @ns3.google.com
> ns1.google.com. dns-admin.google.com. 2013081400 7200 1800 1209600 300
>
> That's a correct SOA record.

Does this look OK?

$ dig soa MASKED.com +short @MASKED1.MASKED.com
MASKED1.MASKED.com. MASKED.MASKED.com. YYYYMMDD00 3600 1801 604800 3601

> What could have happened with that test site is the query timed out and
> the site assumed the universe was therefore about to explode. Use such
> if you want but always verify the results yourself using dig.

Will do.

> The DNSSEC message is not a problem. It means your provider does not use
> DNSSEC. Again, the universe will not explode from this, we all got along
> just fine with plain unsigned DNS transfers for 30 years. DNSSEC is a
> way to digitally sign zone transfers and updates. Nothing to do with
> zone resolution.

Got it, thanks.

- Grant

Reply via email to