This is the warning message named emits when it can't find /dev/random.
20-Apr-2010 02:46:35.879 could not open entropy source /dev/random: file not
found
The message, in question, is NOT emitted by named if it has been
correctly linked. I suspect that the wrong shared library is being
found.
In message , Jo
nathan Reed writes:
>
> bind 9.6.1-P2.
>
> I've dumped it to its file.
> $ sudo rndc dumpdb
> $ cat named_dump.db
> ...
> ; Unassociated entries
> ;
> ; 10.0.0.3 [srtt 610620] [flags 2000] [ttl 1721]
> ; 10.0.0.2 [srtt 16654] [flags 2000] [ttl 1721]
> ;
On 19 Apr 2010, at 20:40, Chris Thompson wrote:
On Apr 19 2010, I wrote:
[...]
Of course, it could also prove there is no DS record for
private.cam.ac.uk, but the absence of NS records as well
apparently makes it think that private.cam.ac.uk is bogus.
More experiments indicate that somethi
If the A records are owned by the target of a CNAME, or by the names
referred to by NS records in the Authority Section, then they're related
to the query being made and therefore not really "unsolicited".
To repeat: BIND doesn't have a way to include unrelated/unsolicited A
records in a respo
> > In article ,
> > Matus UHLAR - fantomas wrote:
> > > on one of my nameservers I see many of these messages in log files:
> > >
> > > Mar 29 07:59:07 gtssk1 named[5012]: security: error: client
> > > 195.168.29.200#65293: view gtsi: check-names failure
> > > dns_registration.in.nextra.sk/A/IN
I do see additional "unsolicited" A-records being returned with CNAME-records
and NS-records. They seem to be honored by the forwarders and resolvers on the
way back.
In addition i should have mentioned that these records will be hosts in the
same domain and this is implemented for a authoritat
On Apr 19 2010, I wrote:
[...]
Of course, it could also prove there is no DS record for
private.cam.ac.uk, but the absence of NS records as well
apparently makes it think that private.cam.ac.uk is bogus.
More experiments indicate that something changed between
9.6.1-P3 and 9.6.2rc1 - previousl
On 4/18/2010 5:17 AM, Fabian Hahn wrote:
To speed up queries for the user I need to force the inclusion of additional
records in a DNS response.
I.e. when returning www.domain.com A I would like to force the inclusion of
A-records for static1.domain.com and static2.domain.com since they wi
A few things to try:
1: Make sure that /dev/urandom is actually doing something:
dd if=/dev/urandom bs=1k count=1 | strings
2: You might want to try the same thing on /dev/random, but you will
(probably) get way way less output -- you might want to look into
seeing if your machines has a ha
bind 9.6.1-P2.
I've dumped it to its file.
$ sudo rndc dumpdb
$ cat named_dump.db
...
; Unassociated entries
;
; 10.0.0.3 [srtt 610620] [flags 2000] [ttl 1721]
; 10.0.0.2 [srtt 16654] [flags 2000] [ttl 1721]
; 10.0.0.1 [srtt 375289] [flags 2000] [ttl 1721]
...
So I c
In message , Chris
Thompson writes:
> We have a forward zone (private.cam.ac.uk) and reverse zones (e.g.
> 16.172.in-addr.arpa) for a subset of RFC1918 addresses that are
> routed throughout, but not outside, the university network. Access
> to these zones is restricted to that network, as the re
We have a forward zone (private.cam.ac.uk) and reverse zones (e.g.
16.172.in-addr.arpa) for a subset of RFC1918 addresses that are
routed throughout, but not outside, the university network. Access
to these zones is restricted to that network, as the results would
not be meaningful elsewhere.
The
I'm running the BIND9 on AIX 5.3. My OS does have /dev/random and /dev/urandom.
# odmget CuDvDr | grep -p random
CuDvDr:
resource = "ddins"
value1 = "random"
value2 = "34"
value3 = ""
crw-r--r--1 root system 34, 0 Feb 26 2009 random
crw-r--r--1
A long time ago it used to be in turn, but all current versions of BIND
sort the forwarders based on a preference value (SRTT) that's derived
from the RTT of previous query/query response interactions, with a 'time
since we last tried this server' incorporated so that servers that
aren't top of the
14 matches
Mail list logo