Re: SERVFAIL on stub zone (WAS: dig @server foobar +trace +recurse)

2015-07-15 Thread Tony Finch
Anne Bennett a...@encs.concordia.ca wrote:

 It all looks just peachy, but when I issued:
   dig @localhost -t ns concordia.ca.
 it gave me a SERVFAIL.  I couldn't find anything abnormal
 in the syslogs.  I can't for the life of my figure out why
 it's unhappy.  How can I debug this?

Try rndc trace 10. The debug logs are written to named.run (not syslog) by
default.

 (I'm syslogging default syslog_all, minus edns-disabled,
 lame-servers, rpz, and unmatched.)

Excluding lame-servers might be why you aren't seeing any log messages.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Southeast Iceland: Variable 3, becoming cyclonic 4 or 5 later. Moderate,
occasionally slight at first. Rain or showers, fog patches. Moderate or good,
occasionally very poor.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: SERVFAIL on stub zone (WAS: dig @server foobar +trace +recurse)

2015-07-15 Thread Anne Bennett

Tony Finch suggested:

 (I'm syslogging default syslog_all, minus edns-disabled,
 lame-servers, rpz, and unmatched.)
 
 Excluding lame-servers might be why you aren't seeing any log
 messages.

I tried un-excluding it: nothing.


   zone concordia.ca {
 type stub;
 file StubData/concordia.ca.SEC;
 masters {
 132.205.1.1 ;
 132.205.7.51 ;
 };
 multi-master yes;
   };

[results in transferring:]

 --
 $ORIGIN .
 $TTL 86400  ; 1 day
 concordia.caIN SOA  ns1.concordia.ca. hostmaster.concordia.ca. (
 2028969738 ; serial
 43200  ; refresh (12 hours)
 1800   ; retry (30 minutes)
 2592000; expire (4 weeks 2 days)
 1800   ; minimum (30 minutes)
 )
 NS  ns1.concordia.ca.
 NS  ns2.concordia.ca.
 --

[but querying it for NS gives SERVFAIL]

 Midnight insight: glue records???  The two listed NS are below the
 zone cut.  How can a stub zone work in those circumstances, if at all?

I think I'm onto something; with the above stub zone for
concordia.ca (which transfers information listing two NS
records as ns1.concordia.ca and ns2.concordia.ca but no glue
records), I get SERVFAIL (after a clean start of named).

And in that circumstance, the other two stub zones I have set up
(for the IPv4 and IPv6 reverse zones for my parent networks) also
transfer the same set of two NS records, and also fail.

If I comment out the stub zone for concordia.ca, but leave
in the two reverse IP stub zones, then these two zones work
correctly: when I query for NS, they give me ns1.concordia.ca
and ns2.concordia.ca, with their A records in the additional
section.

I think that clinches it: the implementation of stub zones
indeed replicates only the NS records, but not the needed
glue records, so it cannot work in cases where all of the
listed NS are within the zone itself.

It would be a nice enhancement to make the stub zone pick up
glue records.  Is this something I should report separately?


Meanwhile, I'll try a static-stub zone for this case...


Tony Finch has also suggested:

 Try rndc trace 10. The debug logs are written to named.run (not
 syslog) by default.

After a bit of tweaking of my logging configuration, I was
able to get the trace output.  I append it (for a query on
the NS records of concordia.ca, with the stub zone in effect),
in case it is of use to anyone.



Anne.
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
---
15-Jul-2015 14:54:47.342 debug level is now 10
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060: UDP request
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060: using view '_default'
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060: request is not signed
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060: recursion available
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060: query
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060 (concordia.ca): 
ns_client_attach: ref = 1
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060 (concordia.ca): query 
'concordia.ca/NS/IN' approved
15-Jul-2015 14:54:47.353 client 127.0.0.1#57060 (concordia.ca): replace
15-Jul-2015 14:54:47.353 clientmgr @0x2b31f95c2458: get client
15-Jul-2015 14:54:47.353 clientmgr @0x2b31f95c2458: recycle
15-Jul-2015 14:54:47.353 fetch: concordia.ca/NS
15-Jul-2015 14:54:47.353 client @0x2b31fc0dfa60: udprecv
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): create
15-Jul-2015 14:54:47.353 log_ns_ttl: fctx 0x2b3204c7f010: fctx_create: 
concordia.ca (in 'concordia.ca'?): 1 86400
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): join
15-Jul-2015 14:54:47.353 fetch 0x2b31f5babd18 (fctx 
0x2b3204c7f010(concordia.ca/NS)): created
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): start
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): try
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): cancelqueries
15-Jul-2015 14:54:47.353 fctx 0x2b3204c7f010(concordia.ca/NS): getaddresses
15-Jul-2015 14:54:47.354 fetch: ns1.concordia.ca/A
15-Jul-2015 14:54:47.354 fctx 0x2b3204cc0010(ns1.concordia.ca/A): create
15-Jul-2015 14:54:47.354 log_ns_ttl: fctx 0x2b3204cc0010: fctx_create: 
ns1.concordia.ca (in 'concordia.ca'?): 1 86400
15-Jul-2015 14:54:47.354 fctx 0x2b3204cc0010(ns1.concordia.ca/A): join
15-Jul-2015 14:54:47.354 fetch 0x2b31f5babd78 (fctx 
0x2b3204cc0010(ns1.concordia.ca/A)): created
15-Jul-2015 14:54:47.354 dns_adb_createfind: started A fetch for name 
ns1.concordia.ca 

SERVFAIL on stub zone (WAS: dig @server foobar +trace +recurse)

2015-07-14 Thread Anne Bennett

Tony Finch d...@dotat.at enlightens me thus:

 The difference between stub and static-stub is that stub works like the
 root zone hints, i.e. the servers in the zone override the ones that you
 configure for a stub zone, whereas the servers you configure for a
 static-stub zone override the servers in the zone.

... so, since I want my parent zone to be able to give me the
set of servers it wants me to use, I configured my resolver
to have (this snippet from named-checkconf -p to deal with
include files and such):

  zone concordia.ca {
type stub;
file StubData/concordia.ca.SEC;
masters {
132.205.1.1 ;
132.205.7.51 ;
};
multi-master yes;
  };

named-checkconf gave no errors.  I issued a reconfig, again
no errors logged or reported.  I can confirm that the zone was
transferred correctly (showing me the internal view), because
I have masterfile-format text as a general option (small
enough number of zones that performance is not an issue, but
human ability to debug *is*), and StubData/concordia.ca.SEC
contains a perfectly normal-looking zone stub:

--
$ORIGIN .
$TTL 86400  ; 1 day
concordia.caIN SOA  ns1.concordia.ca. hostmaster.concordia.ca. (
2028969738 ; serial
43200  ; refresh (12 hours)
1800   ; retry (30 minutes)
2592000; expire (4 weeks 2 days)
1800   ; minimum (30 minutes)
)
NS  ns1.concordia.ca.
NS  ns2.concordia.ca.
--

It all looks just peachy, but when I issued:
  dig @localhost -t ns concordia.ca.
it gave me a SERVFAIL.  I couldn't find anything abnormal
in the syslogs.  I can't for the life of my figure out why
it's unhappy.  How can I debug this?  Is it normal that a
zone could be badly enough out of whack to SERVFAIL, yet
the named would syslog nothing?

(I'm syslogging default syslog_all, minus edns-disabled,
lame-servers, rpz, and unmatched.)


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: SERVFAIL on stub zone (WAS: dig @server foobar +trace +recurse)

2015-07-14 Thread Anne Bennett

   zone concordia.ca {
 type stub;
 file StubData/concordia.ca.SEC;
 masters {
 132.205.1.1 ;
 132.205.7.51 ;
 };
 multi-master yes;
   };

[results in transferring:]

 --
 $ORIGIN .
 $TTL 86400  ; 1 day
 concordia.caIN SOA  ns1.concordia.ca. hostmaster.concordia.ca. (
 2028969738 ; serial
 43200  ; refresh (12 hours)
 1800   ; retry (30 minutes)
 2592000; expire (4 weeks 2 days)
 1800   ; minimum (30 minutes)
 )
 NS  ns1.concordia.ca.
 NS  ns2.concordia.ca.
 --

[but querying it for NS gives SERVFAIL]

Midnight insight: glue records???  The two listed NS are below the
zone cut.  How can a stub zone work in those circumstances, if at all?


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-09 Thread Bob Harold
On Wed, Jul 8, 2015 at 11:55 PM, John Miller johnm...@brandeis.edu wrote:
...



 dig @8.8.8.8 trombone.org +showsearch

 ;  DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.el6_5.1  @8.8.8.8
 trombone.org +showsearch
 ; (1 server found)
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NOERROR, id: 9742
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

 versus

 dig @8.8.8.8 trombone.org

 ;  DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.el6_5.1  @8.8.8.8
 trombone.org
 ; (1 server found)
 ;; global options: +cmd
 ;; Got answer:
 ;; -HEADER- opcode: QUERY, status: NOERROR, id: 36891
 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

 Even after flushing Google's cache (
 https://developers.google.com/speed/public-dns/cache), I still get the
 same response.  Does anyone have insight on +showsearch, other than the
 following ;-)

 ...

showsearch has nothing to do with iteration or recursion.  showsearch
is related to the search list that is used if the domain name you are
searching for is not fully qualified (does not end in a dot).  Only useful
if /etc/resolv.conf has a search list (or domain has more than two
labels which creates an implied search list).   See man page for
resolv.conf for more.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: dig @server foobar +trace +recurse

2015-07-09 Thread Tony Finch
Anne Bennett a...@encs.concordia.ca wrote:

 But my parent (call it example.com) *has* an A record;
 they use it for their web server, I believe.  Will the above
 internally configured A RR not interfere with getting the
 correct data for host -t a example.com?  Or does the sentence
 These records are internally used to resolve names under the
 static-stub zone imply that they are used *only* for this
 purpose, and never leaked out?

The latter. My toy nameserver has a slightly weird configration with
a recursive view containing static-stub zones pointing at its own
authoritative view, like

zone cam.ac.uk { type static-stub; server-addresses { ::1; }; };

And when I dig I get

;  DiG 9.11.0pre-alpha  +noedns +noall +cmd +comments +answer cam.ac.uk
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 41813
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; ANSWER SECTION:
cam.ac.uk.  3457IN  A   131.111.150.25

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
Trafalgar: Northerly or northwesterly, 4 or 5, occasionally 6 in north.
Moderate, occasionally rough in north. Fair. Good.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-09 Thread Tony Finch
John Miller johnm...@brandeis.edu wrote:

 We use stub zones for this purpose - a forwarding zone is what you want if
 you're forwarding to another _recursive_ nameserver (say for caching
 purposes), but if you're just telling your recursors which authoritative
 NSs to use, then stub zones are what you want.

The difference between stub and static-stub is that stub works like the
root zone hints, i.e. the servers in the zone override the ones that you
configure for a stub zone, whereas the servers you configure for a
static-stub zone override the servers in the zone.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
East Sole, Lundy, Fastnet, Irish Sea: Variable 3 or 4 becoming southerly 4 or
5, occasionally 6 in Irish Sea. Slight or moderate. Rain for a time except in
east Sole. Moderate or good, occasionally poor in Irish Sea.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-09 Thread Anne Bennett

Tony Finch d...@dotat.at recommends:

 As for the problem itself, I'll probably fix it by setting up
 a forwarding zone for my parent zone on my resolvers, to make
 sure that I always get the internal view for their data.
 
 Note that the target server of a forward zone should offer recursive
 service.  You will have problems if the target is authoritative-only, and
 serves the zone you are forwarding but not some child zone.

It does offer recursion, but your suggestion is most helpful nevertheless:

 Better to use
 static-stub in that case; that makes BIND do normal iterative resolution
 except it overrides the NS records for just that zone, not its children.

Good point; I want queries for its children (my zones!) to be answered
by my resolvers (which are authoritative for my zones).

 (We make our recursive servers authoritative for our zones to avoid
 problematic dependency cycles - the kind of horror you find out about
 when trying to recover from a power outage.)

Indeed.  Here we're blessed with having had a long-duration
(days!) planned power outage lately for major electrical work,
so my careful redundancy planning has been well tested.  :-)
The local resolvers are totally standalone - no dependencies
on directory services, NFS, or anything but the presence of
the local network and power.

Now back to the static-stub zones... reading the ARM, I see that
I cannot use server-names because the internal-view servers
for my parent zone are in the zone itself, thus I must use
server-addresses.  But I'm told that if I specify:

  zone example.com {
type static-stub;
allow-query { APPROPRIATE_ACL_HERE };
server-addresses { 192.0.2.1; 192.0.2.2; };
  };

then the following RR's are internally configured:

  example.com. NS example.com.
  example.com. A 192.0.2.1
  example.com. A 192.0.2.2

But my parent (call it example.com) *has* an A record;
they use it for their web server, I believe.  Will the above
internally configured A RR not interfere with getting the
correct data for host -t a example.com?  Or does the sentence
These records are internally used to resolve names under the
static-stub zone imply that they are used *only* for this
purpose, and never leaked out?

I guess I can test that in any case; just being paranoid!

Thanks for your suggestion; static-stub is indeed a better solution.


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-09 Thread Anne Bennett

 For my part, I'd be curious to know what sort of problem
 you're trying to solve with dig.

Oh, I solved it.  I was getting different data for my parent
zone depending where I queried from, but the differences
didn't match what I expected based on an internal/external view
classification of the client resolver.  I eventually realized
that for the data I was examining, my resolvers (which have
access to the outside world) could randomly select an external
authoritative nameserver for my parent zone (external view),
or an internal one (internal view), hence the difference.
And of course there was caching involved as well, so data seemed
to toggle randomly back and forth on my various resolvers.

It's by tracing the queries down from the root zone several
times with dig +trace that it finally hit me what was going
on, and in retrospect it's obvious.  At first I had been looking
for some kind of race condition with delegation data from the
grandparent zone getting cached, and then being overridden by
my parent zone's own NS records.  At that point, I was trying
to use @server to try to affect that server's cache by forcing
it to pull certain data into its cache.  But it turns out that
it isn't a child overriding its parents delegations that was
the problem; it's the fact that as an internal client, I am
able to access external views as well.  And in the process
of investigating all this, I realized that of course if I
use +trace, all queries after the first one will *not* use
the @server.  Duh.  I just thought I might save someone else
the muddy thinking by offering a clarification for the manpage.

As for the problem itself, I'll probably fix it by setting up
a forwarding zone for my parent zone on my resolvers, to make
sure that I always get the internal view for their data.

 We might be able to shed a little more light on what the
 best command would be for you.

It all worked fine when I stopped barking up the wrong tree.  ;-)

 The +recurse gets overridden when you use +trace:
 
 +[no]recurse
... Recursion is automatically disabled when the
+nssearch or +trace query options are used.
 
 so you're getting iterative queries whether you want them or not: +trace
 means you're treating yourself as a recursive nameserver,

Yes; an overly quick reading of the docs on my part.  I was trying
to treat myself as a recursive nameserver, so I stuck in +recurse,
which was the wrong thing to do - fortunately it didn't work.  ;-)

 If you send a single query to a remote nameserver, you're only going to get
 a single response--that's how DNS works.  So if you're looking to see the
 chain of lookups that a remote recursive nameserver takes to reach its
 final response, you can run dig +trace from the remote nameserver, or you
 could run a series of dig @server +norecurse hostname queries to get what
 you're looking for.

Right; I wanted the former, and that's what, despite myself,
I got.  That's what comes from not looking seriously at DNS
stuff for months at a time and then trying to reload a lot of
context all at once!

 I admit ignorance on the +showsearch option: I'm not seeing the query flags
 change, nor am I seeing any different output when I run:
 
 dig @8.8.8.8 trombone.org +showsearch
[...]
 versus
 dig @8.8.8.8 trombone.org
[...]
 Does anyone have insight on +showsearch,

I'm sure someone does, but it's not me - I've bumped into enough
walls for one day!  :-)


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-09 Thread Tony Finch
Anne Bennett a...@encs.concordia.ca wrote:

 As for the problem itself, I'll probably fix it by setting up
 a forwarding zone for my parent zone on my resolvers, to make
 sure that I always get the internal view for their data.

Note that the target server of a forward zone should offer recursive
service. You will have problems if the target is authoritative-only, and
serves the zone you are forwarding but not some child zone. Better to use
static-stub in that case; that makes BIND do normal iterative resolution
except it overrides the NS records for just that zone, not its children.

(We make our recursive servers authoritative for our zones to avoid
problematic dependency cycles - the kind of horror you find out about
when trying to recover from a power outage.)

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
South Utsire: Northwesterly gale 8 or severe gale 9, decreasing 5 to 7 later.
Rough or very rough, occasionally moderate later. Showers. Good.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-08 Thread John Miller
For my part, I'd be curious to know what sort of problem you're trying to
solve with dig.  We might be able to shed a little more light on what the
best command would be for you.

The +recurse gets overridden when you use +trace:

+[no]recurse
   ... Recursion is automatically disabled when the
   +nssearch or +trace query options are used.

so you're getting iterative queries whether you want them or not: +trace
means you're treating yourself as a recursive nameserver, and the RD bit
isn't set on your queries.

If you send a single query to a remote nameserver, you're only going to get
a single response--that's how DNS works.  So if you're looking to see the
chain of lookups that a remote recursive nameserver takes to reach its
final response, you can run dig +trace from the remote nameserver, or you
could run a series of dig @server +norecurse hostname queries to get what
you're looking for.

I admit ignorance on the +showsearch option: I'm not seeing the query flags
change, nor am I seeing any different output when I run:

dig @8.8.8.8 trombone.org +showsearch

;  DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.el6_5.1  @8.8.8.8 trombone.org
+showsearch
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 9742
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

versus

dig @8.8.8.8 trombone.org

;  DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.el6_5.1  @8.8.8.8 trombone.org
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 36891
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

Even after flushing Google's cache (
https://developers.google.com/speed/public-dns/cache), I still get the same
response.  Does anyone have insight on +showsearch, other than the
following ;-)

BUGS
   There are probably too many query options.


John



On Wed, Jul 8, 2015 at 6:34 PM, Anne Bennett a...@encs.concordia.ca wrote:


 I've been trying to debug a problem with dig, and it has finally
 occurred to me that, if I understand this correctly, the +trace
 option essentially overrides the @server specification, except for
 the initial query for the root zone nameservers.  (I was using
 +showsearch +trace +recurse.)

 Is my understanding correct?


___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: dig @server foobar +trace +recurse

2015-07-08 Thread Mark Andrews

In message 13180.1436394...@vindemiatrix.encs.concordia.ca, Anne Bennett writ
es:
 
 I've been trying to debug a problem with dig, and it has finally
 occurred to me that, if I understand this correctly, the +trace
 option essentially overrides the @server specification, except for
 the initial query for the root zone nameservers.  (I was using
 +showsearch +trace +recurse.)
 
 Is my understanding correct?
 
 If it is, it might be helpful to add a quick note to the dig
 manpage, perhaps under SIMPLE USAGE, server, something like:
 
   Note that if when the +trace and +recurse options are in
   use, only the initial query for the root zone uses the
   server specified by server (or in /etc/resolv.conf);
   subsequent queries use the authoritative servers in the
   chain of delegation.

Given +trace isn't simple usage (dig @server name type), why would
one say that in the simple usage section?  +trace states that it is
going to talk to each server in turn.

   +[no]trace
   Toggle tracing of the delegation path from the root name servers
   for the name being looked up. Tracing is disabled by default. When
   tracing is enabled, dig makes iterative queries to resolve the name
   being looked up. It will follow referrals from the root servers,
   showing the answer from each server that was used to resolve the
   lookup.

   +dnssec is also set when +trace is set to better emulate the
   default queries from a nameserver.

Mark

 Anne.
 -- 
 Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1
 M8
 a...@encs.concordia.ca+1 514 848-2424 x22
 85
 ___
 Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
  from this list
 
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


dig @server foobar +trace +recurse

2015-07-08 Thread Anne Bennett

I've been trying to debug a problem with dig, and it has finally
occurred to me that, if I understand this correctly, the +trace
option essentially overrides the @server specification, except for
the initial query for the root zone nameservers.  (I was using
+showsearch +trace +recurse.)

Is my understanding correct?

If it is, it might be helpful to add a quick note to the dig
manpage, perhaps under SIMPLE USAGE, server, something like:

  Note that if when the +trace and +recurse options are in
  use, only the initial query for the root zone uses the
  server specified by server (or in /etc/resolv.conf);
  subsequent queries use the authoritative servers in the
  chain of delegation.


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: dig @server foobar +trace +recurse

2015-07-08 Thread Anne Bennett

Mark Andrews ma...@isc.org responds to my suggestion:

 [...] the +trace
 option essentially overrides the @server specification, except for
 the initial query for the root zone nameservers.  [...]
 
 Is my understanding correct?
 
 If it is, it might be helpful to add a quick note to the dig
 manpage, perhaps under SIMPLE USAGE, server, something like:
[deleted]

 Given +trace isn't simple usage (dig @server name type), why would
 one say that in the simple usage section?

Fair enough, and well taken; I can modify my suggestion.

 +trace states that it is
 going to talk to each server in turn.

Very true, and very painfully obvious in retrospect, but
while I was in the throes of trying to figure out my problem,
this managed to somehow escape me for quite a while.  It would
still be nice to clarify it to avoid other people having the
same problem.

How about this:

+[no]trace
Toggle tracing of the delegation path from the root name servers
for the name being looked up. Tracing is disabled by default. When
tracing is enabled, dig makes iterative queries to resolve the name
being looked up. It will follow referrals from the root servers,
showing the answer from each server that was used to resolve the
lookup.

 If @server is also specified, it affects only the
 initial query for the root zone name servers.

+dnssec is also set when +trace is set to better emulate the
default queries from a nameserver.


Anne.
-- 
Ms. Anne Bennett, Senior Sysadmin, ENCS, Concordia University, Montreal H3G 1M8
a...@encs.concordia.ca+1 514 848-2424 x2285
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users