Spain, Dr. Jeffry A. spa...@countryday.net wrote:
My experience with changing the timing metadata or removing the key
files is that named issues a warning like the following: zone zone/IN:
Key zone/algorithm/key tag missing or inactive and has no
replacement: retaining signatures. In this
My experience with changing the timing metadata or removing the key
files is that named issues a warning like the following: zone zone/IN:
Key zone/algorithm/key tag missing or inactive and has no
replacement: retaining signatures. In this circumstance none of the
RRSIGs or NSECs are
It looks to me like this is an EDNS bug. I am querying the authoritative
server directly, with no firewalls in the way. The FORMERR is coming from
the authoritative server not from BIND. I get the same result over IPv4
and IPv6.
They also have a bug in their NXDOMAIN logic: extranet.microsoft.com
Carsten Strotmann (private) c...@strotmann.de wrote:
The FORMERR I'm seeing is also quite odd, as it has the AD flag set,
which should normally not appear in an error type of response, but
might be caused by a mangled DNS packet:
I think it is echoing the AD bit in the query.
; DiG
In article mailman.1121.1340625284.63724.bind-us...@lists.isc.org,
Tony Finch d...@dotat.at wrote:
It looks to me like this is an EDNS bug. ...
There's some kind of delegation bug as well. If I query
dns1[0-3].one.microsoft.com for SOA and NS for
partners.extranet.microsoft.com you get
Hi all,
look for some info on best practices for reverse zones. I have, a pretty big IP
space and alot of reverse zones are not created.
I want to clean it up, a few people that dont really know DNS are thinking of
super netting eg a top level 10.0.0.0/16 sorta thing.
but we have 100s of
The RFC rules on CNAMEs is fairly tight but I am seeing an increasing
amount of traffic with misconfigured CNAMEs some of which are accepted
by BIND as valid responses. The examples capture three trends, note
these are actual responses:
1) Example-1: CNAME in the additional section necessary to
I strongly recommend splitting on /8 /16 and /24 boundries. With the
number of zones you are talking about, doing anything else will get very
confusing very quickly.
If a netblock is larger than a /24, put at the top and bottom of each /24
a comment lile explaining what size it is
For
On Jun 25, 2012, at 2:13 PM, Srinivas Krishnan wrote:
The RFC rules on CNAMEs is fairly tight but I am seeing an increasing
amount of traffic with misconfigured CNAMEs some of which are accepted
by BIND as valid responses. The examples capture three trends, note
these are actual responses:
We've just resolved this amicably--I'd missed the
commercial.service@rcn.comaddress, but was contacted off-list by one
of RCN's engineers, who read
this thread and has removed our domain from their nameservers. He was
quite helpful. No cease-and-desist letter needed--not by a long shot!
John
Chuck,
You are using a caching resolver to check the responses and you only see
response after its been resolved by Google's DNS server. Try dig
@ns1.wordpress.com after12.failblog.org. to see the actual records that you
would receive if you were a DNS server performing an authoritative query
I don't know about best practice in this case, but I decided to put our reverse
entries into one super netting file as you call it.
We had the same problem that a lot of reverse entries were missing, so I wrote
a script to parse the forward file and create the reverse. Then I incorporated
that
In message CA+zrinE1sHkojS1fCNdcgZtF-+QQrTkqmRcfXZ1kUiBr=sq...@mail.gmail.com
, Srinivas Krishnan writes:
The RFC rules on CNAMEs is fairly tight but I am seeing an increasing
amount of traffic with misconfigured CNAMEs some of which are accepted
by BIND as valid responses. The examples
On Jun 25, 2012, at 2:34 PM, Srinivas Krishnan wrote:
You are using a caching resolver to check the responses and you only see
response after its been resolved by Google's DNS server.
The overwhelming majority of Internet users are using caching resolvers running
at their ISP, employer, etc.
Mark,
Is the first parsing step over both Answer and Additional sections, I was under
the impression that Named parses the response into RRSets from the Answer
section and if there is a CNAME chain both within the same zone it follows the
chain as well. But no additional sections are checked
Chuck,
I am talking from the point of view of a DNS server not a client resolver.
Anyways note that the entire CNAME chain is from the same wordpress zone, so
the chain should be followed without requiring an additional query and there is
no need for trying to short circuit the process by
I read bind-users through the comp.protocols.dns.bind newsgroup. I'm
seeing lots of duplicate posts. Most of the replies in the CNAME Rules
thread showed up twice.
Is there a problem with the gateway?
--
Barry Margolin
Arlington, MA
___
Please visit
it's posted 2x, slightly different.
To: comp.protocols.dns.b...@googlegroups.com
To: comp-protocols-dns-b...@isc.org
both cc the newsgroup
-david
On 06/25/2012 06:11 PM, Barry Margolin wrote:
I read bind-users through the comp.protocols.dns.bind newsgroup. I'm
seeing lots of duplicate posts.
On Mon, 25 Jun 2012, David Ford wrote:
it's posted 2x, slightly different.
To: comp.protocols.dns.b...@googlegroups.com
To: comp-protocols-dns-b...@isc.org
I suspect this is an artifact of people starting a thread one place and
cc'ing one reflector or the other. I'll see if I can reach
19 matches
Mail list logo