connect call failing with EINPROGRESS error code.

2010-07-21 Thread R Juneja
Hi,

I am new to socket programming. Please help me with a situation.

The function call connect (non -blocking) is failing with setting the 
errorcode as 36 (EINPROGRESS). I have checked all the relative things. 
They are set properly.


::connect(sd, ((struct sockaddr*) (void*) &(proxyDataPtr->remoteAddr)), 
sizeof(struct sockaddr)) 




Please help me with the solution to handle this situation. or some clues, 
what could be the problem !!

Thanks in advance.

Best Regards
Richi
=-=-=
Notice: The information contained in this e-mail
message and/or attachments to it may contain 
confidential or privileged information. If you are 
not the intended recipient, any dissemination, use, 
review, distribution, printing or copying of the 
information contained in this e-mail message 
and/or attachments to it are strictly prohibited. If 
you have received this communication in error, 
please notify us by reply e-mail or telephone and 
immediately and permanently delete the message 
and any attachments. Thank you


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

USADOTGOV.NET Root Problems?

2010-07-21 Thread Merton Campbell Crockett
Does anyone know if there have been problems with the USADOTGOV.NET root name 
servers today?

We've had people complaining about resolving RADAR.WEATHER.GOV and several 
systems in the NOAA.GOV domain.  If you query for the NS resource records, you 
only receive the ANSWER section.  The ADDITIONAL section with the addresses is 
missing.


--
Merton Campbell Crockett
m.c.crock...@roadrunner.com




___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: . SOA: got insecure response

2010-07-21 Thread Mark Andrews

In message <19526.43429.234698.104...@hadron.switch.ch>, Alexander Gall writes:
> On Wed, 21 Jul 2010 09:20:21 +0200, Gilles Massen  
> said:
> 
> > Hello,
> > Since enabling the root TA in my resolver, I keep seeing from time to time:
> 
> > 21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
> > SOA: attempting insecurity proof
> > 21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
> > SOA: insecurity proof failed
> > 21-Jul-2010 08:52:27.929 dnssec: info:   validating @0x134fe7e8: . SOA:
> > got insecure response; parent indicates it should be secure
> 
> I've seen this for various top-level domains for which I have trust
> anchors configure as well. I could never track this down either, but I
> suspect it has nothing to do with the authoritative servers.
> 
> -- 
> Alex

Named has to deal with multually incompatible senarios.  DNSSEC
which requires EDNS and nameservers and firewalls which drop EDNS
requests so named has to turn off EDNS to get answers back.
Occasionally a set of answers will take too long to get back to
named or are lost due to network problems and named will fallback
to issuing plain DNS queries which will of course fail validation
if the zone is secure and you have a trusted path from a trust
anchor to that zone.  Named will normally re-issue the queries
and get a answer that can be validated as it tries again to use
EDNS.

This will happen more often if you have network equipment that is
blocking large DNS responses (>512 or network MTU) but still lets
through EDNS responses.

If you see this you should also look for congested network paths
and paths with long delays.

Mark

> > Otherwise validation just works fine and mostly I see these:
> > validating @0x134fe7e8: . SOA: marking as secure, noqname proof not needed
> 
> > Following an earlier comment on this list by Mark Andrews (
> > http://www.mail-archive.com/bind-users@lists.isc.org/msg04276.html )
> > I've checked the answers given by the 13 root instances (ipv4 and 6),
> > and all answer to "dig . soa +dnssec" just fine.
> 
> > Trying to capture . SOA queries from the resolver (by a crude
> > tcpdump/grep) failed to show something useful.
> 
> > Any idea what could be the reason for these messages, and how to
> > confirm/retrace the events that lead to such messages? Could it be that
> > lame auth server with a local (unsigned) copy of the root zone triggers
> > this?
> 
> > best regards,
> > Gilles
> 
> > -- 
> > Fondation RESTENA - DNS-LU
> > 6, rue Coudenhove-Kalergi
> > L-1359 Luxembourg
> > tel: (+352) 424409
> > fax: (+352) 422473
> > ___
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
> 
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


IPv6 Records on an IPv4 Network

2010-07-21 Thread Martin McCormick
This is admittedly not a bind question, but it has
become a major nag factor and I am not sure what to recommend.

We delegate our Microsoft Active Directory zone to
Microsoft domain controllers and they have stuffed their zone
with about 750 AAA records and all are publicly visible if one
does a lookup. even the top level of the AD domain has 10 IPv6
responses, one for each controller. The AD admins say that IPv6
is turned off and that the work stations register IPv6 addresses
automatically and so forth, but the final truth is that they are
there, however they got there, and other systems will get the
records when they try to resolve the host name.

Recently, there was a Microsoft update which appears to
cause the resolvers on these Windows7 systems to favor
IPv6 records first and now I am getting reports of timeouts from
Windows boxes looking up other Windows boxes.

What I am asking the list is whether or not anybody
knows of a way to get the Microsoft controllers to ignore the
IPv6 registrations. Having 0 IPv6 records would probably solve
the problem until the day we get a IPv6 allocation and make our
nework IPv6 capable. As of now, it is a down right nuisance. I
am running bind in its default mode where it could handle both
IPv4 and IPv6 addresses, but we have no IPv6 addresses at all in
the zones that we do not delegate. I believe that if I ran bind
in IPv4-only mode, it would make no difference because the
problem zone is delegated. If I am wrong about that, please let
me know.

In best IT tradition, I am hearing "Do something!" and
it seems to me that there is nothing I can do as the zone is
delegated.

Thanks for any constructive ideas or references which
will help the AD folks get rid of those IPv6 records for now.


Martin McCormick WB5AGZ  Stillwater, OK 
Systems Engineer
OSU Information Technology Department Telecommunications Services Group
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Questions regarding global MX and NS records

2010-07-21 Thread Kevin Darcy

On 7/21/2010 2:01 PM, Kevin Darcy wrote:

On 7/21/2010 1:15 PM, Atkins, Brian (GD/VA-NSOC) wrote:

After specifying MX records for a 2nd tier domain, is it necessary to
restate the MX records for a new $ORIGIN? For example, if I have:

$ORIGIN .
...
 IN  MX  10 mx1.example.com.
 IN  MX  10 mx2.example.com.
 IN  MX  10 mx3.example.com.
 IN  MX  10 mx4.example.com.

Do I also need to do the following?:

$ORIGIN blah.example.com.
MX10mx1.example.com.
MX10mx2.example.com.
MX10mx3.example.com.
MX10mx4.example.com.

Or is the first statement sufficient to cover all sub-domains as long as
the MX records are the same?


No, those MX records are owned by different names (example.com and 
blah.example.com).


It is possible to create wildcard MX records (*.example.com) but there 
are serious caveats to doing that, since some MTAs don't handle 
wildcard MX matching very well.


Also, if you have a wildcard in a zone, then you'll never get an 
NXDOMAIN for a query of any name in that part of the namespace 
hierarchy, because the names in such queries will be "matched" by the 
wildcard, even if the lookup is some type other than MX. This might 
have implications in terms of support/troubleshooting procedures, 
caching efficiency, etc.


Personally I'm a fan of using wildcards where they make sense, but you 
have to be *very* careful with them. Go in with your eyes open.



Also, I have a number of records that I redirect to a GSLB device and
have 1,000+ records that I delegate to the devices as follows:

$ORIGIN blah.example.com.
www NS  gss1.example.com.
 NS  gss2.example.com.

Is there a more efficient method of doing this, eliminating the need to
do this for every sub-domain? Perhaps a forward statement in the conf
file?
No, forwarding doesn't work here. The queries you're getting for this 
are predominantly *non-recursive*, and non-recursive queries are never 
forwarded.


We choose to use aliases for this, e.g.

lb.example.com. ns gss1.lb.example.com.
lb.example.com. ns gss2.lb.example.com.
www1.example.com cname www1.lb.example.com.
www2.example.com. cname www2.lb.example.com.
www3.example.com. cname www3.lb.example.com.

etc.

This means we only need 1 record (the CNAME) for each website, rather 
than a delegation per website.


Also, aliasing things this way allows the GSS to respond sanely with 
SOA/NS records for the delegated zone (lb.example.com), when the GSS 
is configured properly to proxy non-A queries to the servers of a 
"shadow" version of the zone. If you delegate each name individually 
to the GSS, you don't get proper SOA/NS record responses (unless you 
were to configure "shadow" versions for *all* 1,000+ of those zones, 
but that's way too much work). Why do you care whether the GSS has 
access to SOA records for any given zone? Because SOAs are required 
for proper negative caching. See RFC 2308.


(Whoops, I forgot a trailing period in one of the example lines above).

Another benefit of aliasing out each name, instead of delegating each 
one individually, is that you avoid a lot of "sub-delegation" ugliness 
if you have multiple sets of load-balancers, and you want to *nest* 
names, using diverse sets of load-balancers, within their own 
application-defined hierarchies, e.g.


; 2 distinct sets of load-balancers, production and pre-production
production-loadbalancers.example.com. ns gss1.example.com.
production-loadbalancers.example.com. ns gss2.example.com.
preprod-loadbalancers.example.com. ns gss3.example.com.
preprod-loadbalancers.example.com. ns gss4.example.com.
; Production website for customer support, using production load-balancers
support.example.com. cname 
support-website.production-loadbalancers.example.com.

; Pre-production website for customer support, using preprod load-balancers
preprod.support.example.com. cname 
support-website.preprod-loadbalancers.example.com.


(Sure, if you can convince your app people to *not* use a 
DNS-label-based hierarchy, e.g. by embedding *within* a label, e.g. 
preprod-support.example.com, then that's another way to avoid the 
ugliness, but oftentimes there are application dependences on DNS names, 
e.g. SSL certificates, and in any case why impose an unnecessary naming 
limitation?)



- Kevin



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Questions regarding global MX and NS records

2010-07-21 Thread Kevin Darcy

On 7/21/2010 1:15 PM, Atkins, Brian (GD/VA-NSOC) wrote:

After specifying MX records for a 2nd tier domain, is it necessary to
restate the MX records for a new $ORIGIN? For example, if I have:

$ORIGIN .
...
 IN  MX  10 mx1.example.com.
 IN  MX  10 mx2.example.com.
 IN  MX  10 mx3.example.com.
 IN  MX  10 mx4.example.com.

Do I also need to do the following?:

$ORIGIN blah.example.com.
MX  10  mx1.example.com.
MX  10  mx2.example.com.
MX  10  mx3.example.com.
MX  10  mx4.example.com.

Or is the first statement sufficient to cover all sub-domains as long as
the MX records are the same?
   


No, those MX records are owned by different names (example.com and 
blah.example.com).


It is possible to create wildcard MX records (*.example.com) but there 
are serious caveats to doing that, since some MTAs don't handle wildcard 
MX matching very well.


Also, if you have a wildcard in a zone, then you'll never get an 
NXDOMAIN for a query of any name in that part of the namespace 
hierarchy, because the names in such queries will be "matched" by the 
wildcard, even if the lookup is some type other than MX. This might have 
implications in terms of support/troubleshooting procedures, caching 
efficiency, etc.


Personally I'm a fan of using wildcards where they make sense, but you 
have to be *very* careful with them. Go in with your eyes open.



Also, I have a number of records that I redirect to a GSLB device and
have 1,000+ records that I delegate to the devices as follows:

$ORIGIN blah.example.com.
www NS  gss1.example.com.
 NS  gss2.example.com.

Is there a more efficient method of doing this, eliminating the need to
do this for every sub-domain? Perhaps a forward statement in the conf
file?
   
No, forwarding doesn't work here. The queries you're getting for this 
are predominantly *non-recursive*, and non-recursive queries are never 
forwarded.


We choose to use aliases for this, e.g.

lb.example.com. ns gss1.lb.example.com.
lb.example.com. ns gss2.lb.example.com.
www1.example.com cname www1.lb.example.com.
www2.example.com. cname www2.lb.example.com.
www3.example.com. cname www3.lb.example.com.

etc.

This means we only need 1 record (the CNAME) for each website, rather 
than a delegation per website.


Also, aliasing things this way allows the GSS to respond sanely with 
SOA/NS records for the delegated zone (lb.example.com), when the GSS is 
configured properly to proxy non-A queries to the servers of a "shadow" 
version of the zone. If you delegate each name individually to the GSS, 
you don't get proper SOA/NS record responses (unless you were to 
configure "shadow" versions for *all* 1,000+ of those zones, but that's 
way too much work). Why do you care whether the GSS has access to SOA 
records for any given zone? Because SOAs are required for proper 
negative caching. See RFC 2308.




- Kevin



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Questions regarding global MX and NS records

2010-07-21 Thread Atkins, Brian (GD/VA-NSOC)
After doing some additional reading, I have another question related to
the MX records.

Using the forward and forwarders statements as follows I could
potentially remove the NS statements for the sub-domains which redirect
queries to the GSLB devices:

forward first;
forwarders { gss1; gss2; };

However, my understanding is that, when the question is asked by the
client, that the question is forwarded on to the servers in the
forwarders statement, but the response is received by the original BIND
server and it responds to the client. If that is the case, this will, to
some effect, negate the ability to GSLB.

Is that a correct statement?

Brian 


-Original Message-
From: bind-users-bounces+brian.atkins2=va@lists.isc.org
[mailto:bind-users-bounces+brian.atkins2=va@lists.isc.org] On Behalf
Of Atkins, Brian (GD/VA-NSOC)
Sent: Wednesday, July 21, 2010 1:15 PM
To: bind-users@lists.isc.org
Subject: Questions regarding global MX and NS records

After specifying MX records for a 2nd tier domain, is it necessary to
restate the MX records for a new $ORIGIN? For example, if I have:

$ORIGIN .
...
IN  MX  10 mx1.example.com.
IN  MX  10 mx2.example.com.
IN  MX  10 mx3.example.com.
IN  MX  10 mx4.example.com.

Do I also need to do the following?:

$ORIGIN blah.example.com.
MX  10  mx1.example.com.
MX  10  mx2.example.com.
MX  10  mx3.example.com.
MX  10  mx4.example.com.

Or is the first statement sufficient to cover all sub-domains as long as
the MX records are the same?

Also, I have a number of records that I redirect to a GSLB device and
have 1,000+ records that I delegate to the devices as follows:

$ORIGIN blah.example.com.
www NS  gss1.example.com.
NS  gss2.example.com.

Is there a more efficient method of doing this, eliminating the need to
do this for every sub-domain? Perhaps a forward statement in the conf
file?

Brian 


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Questions regarding global MX and NS records

2010-07-21 Thread Atkins, Brian (GD/VA-NSOC)
After specifying MX records for a 2nd tier domain, is it necessary to
restate the MX records for a new $ORIGIN? For example, if I have:

$ORIGIN .
...
IN  MX  10 mx1.example.com.
IN  MX  10 mx2.example.com.
IN  MX  10 mx3.example.com.
IN  MX  10 mx4.example.com.

Do I also need to do the following?:

$ORIGIN blah.example.com.
MX  10  mx1.example.com.
MX  10  mx2.example.com.
MX  10  mx3.example.com.
MX  10  mx4.example.com.

Or is the first statement sufficient to cover all sub-domains as long as
the MX records are the same?

Also, I have a number of records that I redirect to a GSLB device and
have 1,000+ records that I delegate to the devices as follows:

$ORIGIN blah.example.com.
www NS  gss1.example.com.
NS  gss2.example.com.

Is there a more efficient method of doing this, eliminating the need to
do this for every sub-domain? Perhaps a forward statement in the conf
file?

Brian 


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Maching characteristics

2010-07-21 Thread Luis Daniel Lucio Quiroz
Hi 

Well i wonder this is the right place.  What server characteristics you 
recomend me as minimum for a bind that will get about
1 req/sec


Linux OS.

LD
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND upgrade Solaris 10 SPARC

2010-07-21 Thread Rock July
Hi All,

I am a newbie in BIND. I want to ask for your help on how to upgrade the BIND 
version of my DNS. I am using Solaris 10 SPARC and my current BIND version is 
BIND 9.6.0-P1. I am planning to upgrade to the latest BIND version, BIND 
9.7.1-P2. What are the requirements and procedure for the upgrade? If I plan to 
revert to my old BIND version, what are the steps?

Thanks and Regards,
Rock


  ___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

BIND 9.7.1-P2 for Solaris 8, 9 and 10 released

2010-07-21 Thread Dennis Clarke
> BIND 9.7.1-P2 is a maintenance release for BIND 9.7.
>

Just an FYI, there are SMF aware packages for bind 9.7.1-P2 avail from the
Blastwave mirrors now. All world wide mirrors will sync within hours but
the primary ( at ISC ) is at http://download.blastwave.org

Please use pkgutil to fetch software packages.

see :

http://mail.opensolaris.org/pipermail/opensolaris-help/2010-July/019259.html
http://mail.opensolaris.org/pipermail/opensolaris-help/2010-July/019260.html

Thanks


-- 
Dennis Clarke
dclarke at opensolaris.ca  <- Email related to the open source Solaris
dclarke at blastwave.org   <- Email related to open source for Solaris



___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: . SOA: got insecure response

2010-07-21 Thread Alexander Gall
On Wed, 21 Jul 2010 09:20:21 +0200, Gilles Massen  
said:

> Hello,
> Since enabling the root TA in my resolver, I keep seeing from time to time:

> 21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
> SOA: attempting insecurity proof
> 21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
> SOA: insecurity proof failed
> 21-Jul-2010 08:52:27.929 dnssec: info:   validating @0x134fe7e8: . SOA:
> got insecure response; parent indicates it should be secure

I've seen this for various top-level domains for which I have trust
anchors configure as well. I could never track this down either, but I
suspect it has nothing to do with the authoritative servers.

-- 
Alex

> Otherwise validation just works fine and mostly I see these:
> validating @0x134fe7e8: . SOA: marking as secure, noqname proof not needed

> Following an earlier comment on this list by Mark Andrews (
> http://www.mail-archive.com/bind-users@lists.isc.org/msg04276.html )
> I've checked the answers given by the 13 root instances (ipv4 and 6),
> and all answer to "dig . soa +dnssec" just fine.

> Trying to capture . SOA queries from the resolver (by a crude
> tcpdump/grep) failed to show something useful.

> Any idea what could be the reason for these messages, and how to
> confirm/retrace the events that lead to such messages? Could it be that
> lame auth server with a local (unsigned) copy of the root zone triggers
> this?

> best regards,
> Gilles

> -- 
> Fondation RESTENA - DNS-LU
> 6, rue Coudenhove-Kalergi
> L-1359 Luxembourg
> tel: (+352) 424409
> fax: (+352) 422473
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


. SOA: got insecure response

2010-07-21 Thread Gilles Massen
Hello,

Since enabling the root TA in my resolver, I keep seeing from time to time:

21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
SOA: attempting insecurity proof
21-Jul-2010 08:52:27.929 dnssec: debug 3:   validating @0x134fe7e8: .
SOA: insecurity proof failed
21-Jul-2010 08:52:27.929 dnssec: info:   validating @0x134fe7e8: . SOA:
got insecure response; parent indicates it should be secure

Otherwise validation just works fine and mostly I see these:
validating @0x134fe7e8: . SOA: marking as secure, noqname proof not needed

Following an earlier comment on this list by Mark Andrews (
http://www.mail-archive.com/bind-users@lists.isc.org/msg04276.html )
I've checked the answers given by the 13 root instances (ipv4 and 6),
and all answer to "dig . soa +dnssec" just fine.

Trying to capture . SOA queries from the resolver (by a crude
tcpdump/grep) failed to show something useful.

Any idea what could be the reason for these messages, and how to
confirm/retrace the events that lead to such messages? Could it be that
lame auth server with a local (unsigned) copy of the root zone triggers
this?

best regards,
Gilles

-- 
Fondation RESTENA - DNS-LU
6, rue Coudenhove-Kalergi
L-1359 Luxembourg
tel: (+352) 424409
fax: (+352) 422473
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users