On 06/06/2021 21:16, Mukul Shukla via nsd-users wrote: Hi Mukul,
> 4. Although, djbdns is working fine since last ten years (I must say its a > brilliantly crafted DNS server), it lacks some security features which are > now a must (eg. DNSSEC). I agree. I have used djbdns in the past, and its authoritative component, tinydns, is very simple and light, and does its job very well. > 5. I want to migrate this name server to NSD, with al the security feature > and high availability so that it meets the current requirements. Okay, so let me clarify some things about NSD. It is a very solid and reliable DNS server. In fact, it powers some of the DNS root name servers, as well as several ccTLD name servers. The reason you don't hear so much about it is that mostly it just runs reliably. As with any software, it has bugs, but they are rare, and are fixed quickly. The documentation is perhaps sparser than that of BIND or Knot, but it's mostly complete. The NSD user community here is quite knowledgeable and helpful, so if you ask good and structured questions, you'll get a lot of help. But I'd like to point one thing out. You mentioned DNSSEC above. NSD can certainly serve DNSSEC signed zones. But it does NOT has any signing ability in it. And it never will. This is what makes NSD so lean, compared to other servers. If you want to sign your zones, you have to do that with external tools, such as dnssec-signzone (from BIND), or ldns-signzone (from LDNS). Or you can install and configure OpenDNSSEC. However, that it certainly no simple task. OpenDNSSEC is fairly complex. So if you want to sign your zones with ease, then I'd recommend using another DNS server such as BIND, Knot DNS or PowerDNS. They all provide authoritative DNS functionality, but also have signing code in them. At RIPE NCC, we use BIND, Knot DNS and NSD to serve the root zone as well as all the reverse DNS zones we operate. It takes quite some work to maintain equivalent configurations for all three, but I am happy with all three. We do this for diversity. For DNSSEC signing, we use Knot DNS, and personally, I am very happy with it. BIND and PowerDNS also automate DNSSEC rather well. > Can anybody please tell me how to plan for this migration so that I have a > minimum downtime. Moreover, I want to build a setup with NSD so that it > runs smoothly for the next 10 years. Of course want to know how to keep on > upgrading will be an issue, I need to consider. Just install NSD (or BIND, Knot or PowerDNS) on your existing servers, and bring it up on a different port, for testing. Load your zones into your new name server, test that they're properly loaded and you can query them, and then you can turn off djbdns, and bring up the new server on port 53. If doing this on the same server is too complex, then setup completely new servers. Once tested, you can ask for your delegation to be changed to these new servers. Or you can just move the IP addresses from the old servers to the new ones, and avoid a delegation change. Use whichever method you feel comfortable with. Regards, Anand _______________________________________________ nsd-users mailing list nsd-users@lists.nlnetlabs.nl https://lists.nlnetlabs.nl/mailman/listinfo/nsd-users