Re: How to minimize the downtime in my case

2013-03-14 Thread Manish Rane
So the TTL value we are discussing here are individual NS TTL Value? Or the
SOA Default TTL Value.
When I viewed my ISP record I found that the SOA Default TTL Value is 12
days and NS RR TTL Value is 3600 secs



On Fri, Mar 15, 2013 at 4:47 AM, Shawn Bakhtiar wrote:

>
> Given the that you will eventually stop using ns1 and ns2 You should
> probably set up mynewns1 as the master with mynewns2 as a slave of mynewns1.
>
>
> --
> Date: Fri, 15 Mar 2013 01:05:50 +0530
> Subject: Re: How to minimize the downtime in my case
> From: manish...@gmail.com
> To: lath...@gmail.com
> CC: bind-users@lists.isc.org
>
>
> Will my new config would look like this? will it be a Slave for my new
> servers?
>
> ns1.example.com1.2.3.4---> Master
> > ns2.example.com 5.6.7.8-->Slave
> > mynewns1.example.com   20.20.20.20   --> Slave
> > mynewns2.example.com   30.30.30.30  >  Slave
>
>
>
> On Fri, Mar 15, 2013 at 12:44 AM, Manish Rane  wrote:
>
> hmm...you are talking about SOA TTL Value?
>
>
>
>
> On Fri, Mar 15, 2013 at 12:40 AM, Andrew Latham  wrote:
>
> Manish
>
> That is a perfectly good plan.  One note is to study your TTL.  If
> your ISP has set a longer TTL on your NS records then you would need
> to first ask for a shorter TTL and wait until the time has passed.
>
> Example: if TTL is set to one week, ask for change to shorter period
> and then wait for 1.5(or more) times the old TTL to pass before you
> begin your process.
>
>
>
> On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:
> > Hey Folks,
> >
> > I right now have NS server hosted with ISP and I am planning to set up my
> > own BIND servers. Now I would like to understand that I need to ask my
> > Registrar to populate the entry of my new NS server which would take 4-6
> > hours to propagate over the internet.
> >
> > To reduce the downtime, can I not add those two new NS servers along
> with my
> > old DNS server with exact zone? once all the NS entries populate over the
> > internet I can have my ISP's DNS removed and have one of my DNS server as
> > Master?
> >
> >
> > Current Scenario
> > 
> >
> > ns1.example.com1.2.3.4
> > ns2.example.com 5.6.7.8
> >
> >
> > I am thnking of below scenario
> >
> > ns1.example.com1.2.3.4
> > ns2.example.com 5.6.7.8
> > mynewns1.example.com   20.20.20.20
> > mynewns2.example.com   30.30.30.30
> >
> > Then after few days
> >
> > mynewns1.example.com   20.20.20.20
> > mynewns2.example.com   30.30.30.30
> >
> > Which eventually should have all the records.
> >
> > Please advise!!
> >
> >
> >
> > ___
> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> > unsubscribe from this list
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
>
>
> --
> ~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~
>
>
>
>
> ___ Please visit
> https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from
> this list bind-users mailing list bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

RE: How to minimize the downtime in my case

2013-03-14 Thread Shawn Bakhtiar

Given the that you will eventually stop using ns1 and ns2 You should probably 
set up mynewns1 as the master with mynewns2 as a slave of mynewns1.


Date: Fri, 15 Mar 2013 01:05:50 +0530
Subject: Re: How to minimize the downtime in my case
From: manish...@gmail.com
To: lath...@gmail.com
CC: bind-users@lists.isc.org

Will my new config would look like this? will it be a Slave for my new servers?

ns1.example.com1.2.3.4---> Master

> ns2.example.com 5.6.7.8-->Slave
> mynewns1.example.com   20.20.20.20   --> Slave

> mynewns2.example.com   30.30.30.30  >  Slave




On Fri, Mar 15, 2013 at 12:44 AM, Manish Rane  wrote:

hmm...you are talking about SOA TTL Value?



On Fri, Mar 15, 2013 at 12:40 AM, Andrew Latham  wrote:


Manish



That is a perfectly good plan.  One note is to study your TTL.  If

your ISP has set a longer TTL on your NS records then you would need

to first ask for a shorter TTL and wait until the time has passed.



Example: if TTL is set to one week, ask for change to shorter period

and then wait for 1.5(or more) times the old TTL to pass before you

begin your process.







On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:

> Hey Folks,

>

> I right now have NS server hosted with ISP and I am planning to set up my

> own BIND servers. Now I would like to understand that I need to ask my

> Registrar to populate the entry of my new NS server which would take 4-6

> hours to propagate over the internet.

>

> To reduce the downtime, can I not add those two new NS servers along with my

> old DNS server with exact zone? once all the NS entries populate over the

> internet I can have my ISP's DNS removed and have one of my DNS server as

> Master?

>

>

> Current Scenario

> 

>

> ns1.example.com1.2.3.4

> ns2.example.com 5.6.7.8

>

>

> I am thnking of below scenario

>

> ns1.example.com1.2.3.4

> ns2.example.com 5.6.7.8

> mynewns1.example.com   20.20.20.20

> mynewns2.example.com   30.30.30.30

>

> Then after few days

>

> mynewns1.example.com   20.20.20.20

> mynewns2.example.com   30.30.30.30

>

> Which eventually should have all the records.

>

> Please advise!!

>

>

>

> ___

> Please visit https://lists.isc.org/mailman/listinfo/bind-users to

> unsubscribe from this list

>

> bind-users mailing list

> bind-users@lists.isc.org

> https://lists.isc.org/mailman/listinfo/bind-users







--

~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~






___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users   
  ___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Announcements for latest beta releases delayed by accident.

2013-03-14 Thread Michael McNally

With apologies to readers of this list: the announcement e-mails
for BIND 9.6-ESV-R9b2, 9.8.5b2, and 9.9.3b2 were sent to the
bind-announce list earlier this week but a typo in my shell script
incorrectly prevented the bind-users and bind-workers lists from
receiving the announcement at that time.

The bind-announce list *is* the place to go for official announcements
about BIND releases but since we have traditionally announced them
in bind-users and bind-workers as well, I know some of you do not
subscribe to the announce list.  So for those who are just receiving
this news -- new betas are available, have at them!

Again, apologies for the oversight,

Michael McNally
ISC Support
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.9.3b2 is now available

2013-03-14 Thread Michael McNally
Introduction

   BIND 9.9.3b2 is the second beta release of BIND 9.9.3.

   This document summarizes changes from BIND 9.9.2 to BIND 9.9.3b2.
   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options.
   Free support is provided by our user community via a mailing
   list. Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents a named assert (crash) when using RPZ to generate A
   records (but not  records) and DNS64 to generate  records
   from A records. (CVE-2012-5689)  [RT #32141] New Features

   Add support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]

Feature Changes

   Updates the built-in root hints for D.ROOT-SERVERS.NET whose
   IPv4 address changed to 199.7.91.13 (as of 3rd January 2013).
   Note that recursive servers running with an older set of root
   hints will still operate successfully because there are 12 other
   root servers whose addresses are correct and who will respond
   during root priming with the new root nameserver RRset.  [RT #32164]

   Adds RFC 6598 reverse zones to the built-in empty zones list:
   64.100.IN-ADDR.ARPA ... 127.100.IN-ADDR.ARPA. [RT #31336]

   Makes available a new XML schema (version 3.0) for the statistics
   channel that adds query type statistics at the zone level,
   flattens the XML tree and uses compressed format to optimize
   parsing. It also includes new XSL that permits charting via the
   Google Charts API on browsers that support javascript in XSL.
   To enable, build BIND with "configure --enable-newstats". [RT #30023] 

   "named -V" can now report a source ID string.  (This is will be
   of most interest to developers and troubleshooters).  The source
   ID for ISC's production versions of BIND is defined in the "srcid"
   file in the build tree and is normally set to the most recent
   git hash. [RT #31494]

   Response Policy Zone performance enhancements.  New "response-policy"
   option "min-ns-dots".  "nsip" and "nsdname" now enabled by default
   with RPZ. [RT #32251]

   Now includes, in the community contribution section, a
   dynamically-loadable DLZ module: BDBHPT, contributed by Mark
   Goldfinch. [RT #32549]

Bug Fixes

   Allow max-cache-size and max-acache-size to accept values greater
   than 4 gigabytes when built with 64-bit integers.  "unlimited"
   still means 4 gigabytes - 1 and "0" still allows truly unlimited
   cache sizes. [RT #32358]

   Removed lock contention issues that slowed zone loading times
   for 9.9.x compared with 9.8.x.  Zone loading times are now faster
   than they were with 9.8.x. [RT #30399]

   The zone-statistics option now takes three options: "full",
   "terse", and "none".  "yes" is now a synonym for "full".  "no"
   is now a synonym for "terse", which is how it behaved in previous
   versions. [RT #29165]

   The default value for the number of UDP dispatchers is now either
   the number of CPUs or the number of worker threads, whichever
   is lower.  The previous default was the number of worker threads.
   [RT #30964]

   Fixed a crash bug with the loading of incomplete configurations
   including a slave zone with inline-signing and without a file
   name. [RT #31946]

   Corrected dnssec-signzone and dnssec-verify behavior with opt-out
   delegations and NSEC3. [RT #32072]

   Fixed rendering issues for some statistics with the XML stats
   channel. [RT #32587]

   Prevent a crash-on-shutdown race condition. [RT #32777]

   Fixed glitch in displaying query data when configured with
   --enable-newstats and no queries have yet been received. [RT
   #32620]

   Fixed bug where expired slave zones could fail to rewrite the
   zone data file after the master is again available. [RT #31276]

   Fixed a potential crash when adding and deleting keys with rndc.
   [RT #32506]

   Fixed a possible crash with Diffie-Hellman generated TSIG keys.
   [RT #32649]

   Now supports NAPTR regular expression validation on all platforms.
   [RT #32688]

   Increased maximum allowed key size for some algorithms in
   ddns-confgen and rndc-confgen. [RT #32753]

   nsupdate could exit with an assertion when the local and remote
   address families didn't match. [RT #22897]

   Fixes some potential memory leaks with gssapi usage. [RT #32405]

   Fixes a coup

BIND 9.8.5b2 is now available

2013-03-14 Thread Michael McNally
Introduction

   BIND 9.8.5b2 is the second beta release of BIND 9.8.5

   This document summarizes changes from BIND 9.8.4 to BIND 9.8.5b2.
   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options.
   Free support is provided by our user community via a mailing
   list. Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents a named assert (crash) when using RPZ to generate A
   records (but not  records) and DNS64 to generate  records
   from A records. (CVE-2012-5689)  [RT #32141]

New Features

   Add support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]

Feature Changes

   Updates the built-in root hints for D.ROOT-SERVERS.NET whose
   IPv4 address changed to 199.7.91.13 (as of 3rd January 2013).
   Note that recursive servers running with an older set of root
   hints will still operate successfully because there are 12 other
   root servers whose addresses are correct and who will respond
   during root priming with the new root nameserver RRset.  [RT #32164]

   Adds RFC 6598 reverse zones to the built-in empty zones list:
   64.100.IN-ADDR.ARPA ... 127.100.IN-ADDR.ARPA. [RT #31336]

   "named -V" can now report a source ID string.  (This is will be
   of most interest to developers and troubleshooters).  The source
   ID for ISC's production versions of BIND is defined in the "srcid"
   file in the build tree and is normally set to the most recent
   git hash. [RT #31494]

   Response Policy Zone performance enhancements.  New "response-policy"
   option "min-ns-dots".  "nsip" and "nsdname" now enabled by default
   with RPZ. [RT #32251]

Bug Fixes

   Fixed bug where expired slave zones could fail to rewrite the
   zone data file after the master is again available. [RT #31276]

   Fixed a potential crash when adding and deleting keys with rndc.
   [RT #32506]

   Prevent a crash-on-shutdown race condition. [RT #32777]

   Fixed a possible crash with Diffie-Hellman generated TSIG keys.
   [RT #32649]

   Now supports NAPTR regular expression validation on all platforms.
   [RT #32688]

   Increased maximum allowed key size for some algorithms in
   ddns-confgen and rndc-confgen. [RT #32753]

   nsupdate could exit with an assertion when the local and remote
   address families didn't match. [RT #22897]

   Fixes some potential memory leaks with gssapi usage. [RT #32405]

   Fixes a couple of linked-list pointer initialization bugs. [RT
   #32651]

   dnssec-keygen and dnssec-setttime disallow setting the delete
   date to be sooner than the inactive date. [RT #31719]

   Update HSM PKCS#11 patches to openssl to add support for openssl
   versions 0.9.8x, 1.0.0j, and 1.0.1c. [RT #29749]

   ddns-confgen now accepts all the TSIG algorithms that it is
   documented as supporting when generating keys. [RT #31927]

   Missing 'managed-keys-directory' is now handled better.  Prior
   to this change, when misconfigured, named could loop and consume
   100% CPU.  [RT #30625]

   Handle cases where a port is reserved and cannot be used as the
   source for a query. [RT #31778]

   Correct a case where a negative response could incorrectly be
   flagged as being DNSSEC authenticated when it was not actually
   authenticated. [RT #32237]

   Fix missing includes in testing support library that caused it
   to fail to build on some platforms. [RT #32012]

   Return correct error code (FORMERR) when presented with malformed
   requests containing overly long domain names. [RT #29682]

   Instead of rejecting and logging a FORMERR, named now accepts
   duplicate singleton records in a DNS query response.  (In some
   situations, query responses may contain duplicates - and whilst
   this is not technically correct, BIND has been updated to be
   more tolerant).  [RT #32329]

   When named allocates an initial per-thread stack size, it first
   checks the operating system's default value, and if specified,
   uses that.  In the situation where it appears that none is
   provided, it uses an internal default.  This default has been
   increased from 64K to 1M to accommodate operating systems that
   require a larger initial stack.  [RT #32230]

   The allow-query-on ACL is now processed correctly in all situations.
   [RT #29486]

   The configure script now

BIND 9.6-ESV-R9b2 is now available

2013-03-14 Thread Michael McNally
Introduction

   BIND 9.6-ESV-R9b2 is the second beta release of BIND 9.6-ESV-R9.

   BIND 9.6-ESV is an Extended Support Version of BIND.

   This document summarizes changes from BIND 9.6-ESV-R8 to BIND
   9.6-ESV-R9b2.  Please see the CHANGES file in the source code
   release for a complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options.
   Free support is provided by our user community via a mailing
   list. Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized. [CVE-2012-3817]
   [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process. [CVE-2012-1667] [RT #29644]

New Features

   Add support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]

Feature Changes

   Updates the built-in root hints for D.ROOT-SERVERS.NET whose
   IPv4 address changed to 199.7.91.13 (as of 3rd January 2013).
   Note that recursive servers running with an older set of root
   hints will still operate successfully because there are 12 other
   root servers whose addresses are correct and who will respond
   during root priming with the new root nameserver RRset.  [RT #32164]

   Adds RFC 6598 reverse zones to the built-in empty zones list:
   64.100.IN-ADDR.ARPA ... 127.100.IN-ADDR.ARPA. [RT #31336]

Bug Fixes

   nsupdate could exit with an assertion when the local and remote
   address families didn't match. [RT #22897]

   Fixes some potential memory leaks with gssapi usage. [RT #32405]

   Prevent a crash-on-shutdown race condition. [RT #32777]

   Fixes a couple of linked-list pointer initialization bugs. [RT
   #32651]

   Handle cases where a port is reserved and cannot be used as the
   source for a query. [RT #31778]

   Correct a case where a negative response could incorrectly be
   flagged as being DNSSEC authenticated when it was not actually
   authenticated. [RT #32237]

   Fix missing includes in testing support library that caused it
   to fail to build on some platforms. [RT #32012]

   Return correct error code (FORMERR) when presented with malformed
   requests containing overly long domain names. [RT #29682]

   Instead of rejecting and logging a FORMERR, named now accepts
   duplicate singleton records in a DNS query response.  (In some
   situations, query responses may contain duplicates - and whilst
   this is not technically correct, BIND has been updated to be
   more tolerant).  [RT #32329]

   When named allocates an initial per-thread stack size, it first
   checks the operating system's default value, and if specified,
   uses that.  In the situation where it appears that none is
   provided, it uses an internal default.  This default has been
   increased from 64K to 1M to accommodate operating systems that
   require a larger initial stack.  [RT #32230]

   The allow-query-on ACL is now processed correctly in all situations.
   [RT #29486]

   The configure script now supports and detects libxml2-2.9.x
   correctly. [RT #32231]

   When loading a zone file, named now emits a warning if it
   encounters a non-blank owner name following $ORIGIN.  The reason
   for this is that when parsing a zone file, the blank owner name
   indicates that the current name (i.e. the name from the previous
   record that named loaded) should be used, even though $ORIGIN
   has changed.  Particularly when handling subdomains, this can
   result in those records being unexpectedly loaded with different
   labels than intended.   [RT #31848]

   Resolves a problem that when answering queries for nonexistent
   names via wildcard CNAME records, DNSSEC responses could fail
   to include the NSEC/NSEC3 records proving the lack of a better
   answer.  [RT #21409]

   Prevents a named abort  (assertion fail) during recovery from
   an out of memory condition.  This crash would be encountered in
   module general: dst_api.c and logged as REQUIRE((&key->refs)->refs
   == 0).  [RT #32131]

   A new configure option --with-ecdsa has been added to force
   building with ECDSA, bypassing the script-based checks that this
   functionality is available in the build environment. The converse,
   --without-ecdsa, explicitly disables ECDSA support during the
   BIND build.  Both of these options have been added to assist
   cross-compilation to environments that do (or don't) support
   ECDSA, overriding the default build behaviour.   [RT #32078]


Re: How to minimize the downtime in my case

2013-03-14 Thread Manish Rane
Will my new config would look like this? will it be a Slave for my new
servers?

ns1.example.com1.2.3.4---> Master
> ns2.example.com 5.6.7.8-->Slave
> mynewns1.example.com   20.20.20.20   --> Slave
> mynewns2.example.com   30.30.30.30  >  Slave



On Fri, Mar 15, 2013 at 12:44 AM, Manish Rane  wrote:

> hmm...you are talking about SOA TTL Value?
>
>
>
>
> On Fri, Mar 15, 2013 at 12:40 AM, Andrew Latham  wrote:
>
>> Manish
>>
>> That is a perfectly good plan.  One note is to study your TTL.  If
>> your ISP has set a longer TTL on your NS records then you would need
>> to first ask for a shorter TTL and wait until the time has passed.
>>
>> Example: if TTL is set to one week, ask for change to shorter period
>> and then wait for 1.5(or more) times the old TTL to pass before you
>> begin your process.
>>
>>
>>
>> On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:
>> > Hey Folks,
>> >
>> > I right now have NS server hosted with ISP and I am planning to set up
>> my
>> > own BIND servers. Now I would like to understand that I need to ask my
>> > Registrar to populate the entry of my new NS server which would take 4-6
>> > hours to propagate over the internet.
>> >
>> > To reduce the downtime, can I not add those two new NS servers along
>> with my
>> > old DNS server with exact zone? once all the NS entries populate over
>> the
>> > internet I can have my ISP's DNS removed and have one of my DNS server
>> as
>> > Master?
>> >
>> >
>> > Current Scenario
>> > 
>> >
>> > ns1.example.com1.2.3.4
>> > ns2.example.com 5.6.7.8
>> >
>> >
>> > I am thnking of below scenario
>> >
>> > ns1.example.com1.2.3.4
>> > ns2.example.com 5.6.7.8
>> > mynewns1.example.com   20.20.20.20
>> > mynewns2.example.com   30.30.30.30
>> >
>> > Then after few days
>> >
>> > mynewns1.example.com   20.20.20.20
>> > mynewns2.example.com   30.30.30.30
>> >
>> > Which eventually should have all the records.
>> >
>> > Please advise!!
>> >
>> >
>> >
>> > ___
>> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>> > unsubscribe from this list
>> >
>> > bind-users mailing list
>> > bind-users@lists.isc.org
>> > https://lists.isc.org/mailman/listinfo/bind-users
>>
>>
>>
>> --
>> ~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~
>>
>
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Blocking private addresses with a optionq

2013-03-14 Thread Vernon Schryver
> From: "Lawrence K. Chen, P.Eng." 

> ... So, being able to filter out these 'bad' things when responding
> queries against that data might be a good thing.

RPZ might be used for such things.  However, by design RPZ rewrites
entire responses.  It is triggered by individual records in a response,
but changes the entire response and not just individual records within
the response.

To use RPZ for such filtering, you would probably use views with
a response-policy{} statement in the external view to be filtered.

The RPZ rules could be triggered by rpz-ip records for 10.0.0.0/8 or
similar.  The rules might rewrite responses to a CNAME or to sets of
A and  records suitable for outsiders.  That sounds a lot more
fragile and error prone than distinct zones for insiders and outsiders
specified in the view statements.  However, RPZ might be good as a
failsafe against leaks (perhaps rewriting to NXDOMAIN).


Vernon Schryverv...@rhyolite.com
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to minimize the downtime in my case

2013-03-14 Thread Manish Rane
Also when my ISP DNS servers are live do I need to add mine one as a slave
ones? both?



On Fri, Mar 15, 2013 at 12:44 AM, Manish Rane  wrote:

> hmm...you are talking about SOA TTL Value?
>
>
>
>
> On Fri, Mar 15, 2013 at 12:40 AM, Andrew Latham  wrote:
>
>> Manish
>>
>> That is a perfectly good plan.  One note is to study your TTL.  If
>> your ISP has set a longer TTL on your NS records then you would need
>> to first ask for a shorter TTL and wait until the time has passed.
>>
>> Example: if TTL is set to one week, ask for change to shorter period
>> and then wait for 1.5(or more) times the old TTL to pass before you
>> begin your process.
>>
>>
>>
>> On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:
>> > Hey Folks,
>> >
>> > I right now have NS server hosted with ISP and I am planning to set up
>> my
>> > own BIND servers. Now I would like to understand that I need to ask my
>> > Registrar to populate the entry of my new NS server which would take 4-6
>> > hours to propagate over the internet.
>> >
>> > To reduce the downtime, can I not add those two new NS servers along
>> with my
>> > old DNS server with exact zone? once all the NS entries populate over
>> the
>> > internet I can have my ISP's DNS removed and have one of my DNS server
>> as
>> > Master?
>> >
>> >
>> > Current Scenario
>> > 
>> >
>> > ns1.example.com1.2.3.4
>> > ns2.example.com 5.6.7.8
>> >
>> >
>> > I am thnking of below scenario
>> >
>> > ns1.example.com1.2.3.4
>> > ns2.example.com 5.6.7.8
>> > mynewns1.example.com   20.20.20.20
>> > mynewns2.example.com   30.30.30.30
>> >
>> > Then after few days
>> >
>> > mynewns1.example.com   20.20.20.20
>> > mynewns2.example.com   30.30.30.30
>> >
>> > Which eventually should have all the records.
>> >
>> > Please advise!!
>> >
>> >
>> >
>> > ___
>> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to
>> > unsubscribe from this list
>> >
>> > bind-users mailing list
>> > bind-users@lists.isc.org
>> > https://lists.isc.org/mailman/listinfo/bind-users
>>
>>
>>
>> --
>> ~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~
>>
>
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: How to minimize the downtime in my case

2013-03-14 Thread Manish Rane
hmm...you are talking about SOA TTL Value?



On Fri, Mar 15, 2013 at 12:40 AM, Andrew Latham  wrote:

> Manish
>
> That is a perfectly good plan.  One note is to study your TTL.  If
> your ISP has set a longer TTL on your NS records then you would need
> to first ask for a shorter TTL and wait until the time has passed.
>
> Example: if TTL is set to one week, ask for change to shorter period
> and then wait for 1.5(or more) times the old TTL to pass before you
> begin your process.
>
>
>
> On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:
> > Hey Folks,
> >
> > I right now have NS server hosted with ISP and I am planning to set up my
> > own BIND servers. Now I would like to understand that I need to ask my
> > Registrar to populate the entry of my new NS server which would take 4-6
> > hours to propagate over the internet.
> >
> > To reduce the downtime, can I not add those two new NS servers along
> with my
> > old DNS server with exact zone? once all the NS entries populate over the
> > internet I can have my ISP's DNS removed and have one of my DNS server as
> > Master?
> >
> >
> > Current Scenario
> > 
> >
> > ns1.example.com1.2.3.4
> > ns2.example.com 5.6.7.8
> >
> >
> > I am thnking of below scenario
> >
> > ns1.example.com1.2.3.4
> > ns2.example.com 5.6.7.8
> > mynewns1.example.com   20.20.20.20
> > mynewns2.example.com   30.30.30.30
> >
> > Then after few days
> >
> > mynewns1.example.com   20.20.20.20
> > mynewns2.example.com   30.30.30.30
> >
> > Which eventually should have all the records.
> >
> > Please advise!!
> >
> >
> >
> > ___
> > Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> > unsubscribe from this list
> >
> > bind-users mailing list
> > bind-users@lists.isc.org
> > https://lists.isc.org/mailman/listinfo/bind-users
>
>
>
> --
> ~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~
>
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Blocking private addresses with a optionq

2013-03-14 Thread Lawrence K. Chen, P.Eng.


- Original Message -
> On Mar 14, 2013, at 3:29 AM, Tony Finch wrote:
> 
> > King, Harold Clyde (Hal)  wrote:
> > 
> >> Is there an option for bind like the allow-recursion {
> >>  }
> >> For blocking out going records of 10.0.0.0/8 and 192.168.0.0/16 so
> >> I could do a view like:
> > 
> > I'm not sure what you mean by "blocking out going records" but
> > there are a
> > couple of options that might do what you want:
> > 
> > There is the "blackhole" acl which makes named ignore all requests
> > and
> > never send queries to a particular address range.
> > 
> > There is the server ... { bogus yes; }; clause which stops named
> > from
> > sending queries to a particular address range.
> 
> No, I'm pretty sure the OP wants to strip records from responses if
> the records are A records referring to private address space (RFC
> 1918).
> 
> I've no idea how you would do this.
> 

This actually sounds like something I might want to do

We do have RFC1918 addresses in use.  And, I've heard of people abusing IPv6 
since its currently blocked at the border.  Plus people publishing DNS64 
addresses for their hosts.

While I run the authoritative servers here, and do split horizon.  So, I try to 
keep the RFC1918 addresses out of the external view.  Either by refusing the 
add/change request, or for certain groups do selective $INCLUDE and other 
trickery.  Though someday I should audit the existing zone data.

And we shouldn't be leaking those IPs anymore. :)

But, there are groups on campus that run their own master server for their 3rd 
level domains (i.e. the college engineering has most of the engineering related 
3rd level domains).  So, my authoritative servers are only slaves and possibly 
the only ones that can be reached from the outside.  So, being able to filter 
out these 'bad' things when responding queries against that data might be a 
good thing.

-- 
Who: Lawrence K. Chen, P.Eng. - W0LKC - Senior Unix Systems Administrator
For: Enterprise Server Technologies (EST) -- & SafeZone Ally
Snail: Computing and Telecommunications Services (CTS)
Kansas State University, 109 East Stadium, Manhattan, KS 66506-3102
Phone: (785) 532-4916 - Fax: (785) 532-3515 - Email: lkc...@ksu.edu
Web: http://www-personal.ksu.edu/~lkchen - Where: 11 Hale Library
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to minimize the downtime in my case

2013-03-14 Thread Andrew Latham
Manish

That is a perfectly good plan.  One note is to study your TTL.  If
your ISP has set a longer TTL on your NS records then you would need
to first ask for a shorter TTL and wait until the time has passed.

Example: if TTL is set to one week, ask for change to shorter period
and then wait for 1.5(or more) times the old TTL to pass before you
begin your process.



On Thu, Mar 14, 2013 at 3:04 PM, Manish Rane  wrote:
> Hey Folks,
>
> I right now have NS server hosted with ISP and I am planning to set up my
> own BIND servers. Now I would like to understand that I need to ask my
> Registrar to populate the entry of my new NS server which would take 4-6
> hours to propagate over the internet.
>
> To reduce the downtime, can I not add those two new NS servers along with my
> old DNS server with exact zone? once all the NS entries populate over the
> internet I can have my ISP's DNS removed and have one of my DNS server as
> Master?
>
>
> Current Scenario
> 
>
> ns1.example.com1.2.3.4
> ns2.example.com 5.6.7.8
>
>
> I am thnking of below scenario
>
> ns1.example.com1.2.3.4
> ns2.example.com 5.6.7.8
> mynewns1.example.com   20.20.20.20
> mynewns2.example.com   30.30.30.30
>
> Then after few days
>
> mynewns1.example.com   20.20.20.20
> mynewns2.example.com   30.30.30.30
>
> Which eventually should have all the records.
>
> Please advise!!
>
>
>
> ___
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users



-- 
~ Andrew "lathama" Latham lath...@gmail.com http://lathama.net ~
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: How to minimize the downtime in my case

2013-03-14 Thread Chuck Swiger
Hi--

On Mar 14, 2013, at 12:04 PM, Manish Rane wrote:
> I right now have NS server hosted with ISP and I am planning to set up my own 
> BIND servers. Now I would like to understand that I need to ask my Registrar 
> to populate the entry of my new NS server which would take 4-6 hours to 
> propagate over the internet.
> 
> To reduce the downtime, can I not add those two new NS servers along with my 
> old DNS server with exact zone? once all the NS entries populate over the 
> internet I can have my ISP's DNS removed and have one of my DNS server as 
> Master?

You can.

> once all the NS entries populate over the internet I can have my ISP's DNS 
> removed and have one of my DNS server as Master?

Sure.  Validate that your new servers work before turning off the old ones for 
the zone with your registrar, but otherwise, you should be fine.

Regards,
-- 
-Chuck

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


How to minimize the downtime in my case

2013-03-14 Thread Manish Rane
Hey Folks,

I right now have NS server hosted with ISP and I am planning to set up my
own BIND servers. Now I would like to understand that I need to ask my
Registrar to populate the entry of my new NS server which would take 4-6
hours to propagate over the internet.

To reduce the downtime, can I not add those two new NS servers along with
my old DNS server with exact zone? once all the NS entries populate over
the internet I can have my ISP's DNS removed and have one of my DNS server
as Master?


Current Scenario


ns1.example.com1.2.3.4
ns2.example.com 5.6.7.8


I am thnking of below scenario

ns1.example.com1.2.3.4
ns2.example.com 5.6.7.8
mynewns1.example.com   20.20.20.20
mynewns2.example.com   30.30.30.30

Then after few days

mynewns1.example.com   20.20.20.20
mynewns2.example.com   30.30.30.30

Which eventually should have all the records.

Please advise!!
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Blocking private addresses with a optionq

2013-03-14 Thread Kevin Darcy

On 3/14/2013 6:29 AM, Tony Finch wrote:

King, Harold Clyde (Hal)  wrote:


Is there an option for bind like the allow-recursion {  }
For blocking out going records of 10.0.0.0/8 and 192.168.0.0/16 so I could do a 
view like:

I'm not sure what you mean by "blocking out going records" but there are a
couple of options that might do what you want:

There is the "blackhole" acl which makes named ignore all requests and
never send queries to a particular address range.

There is the server ... { bogus yes; }; clause which stops named from
sending queries to a particular address range.
I think he wants to strip addresses (A and/or ) of certain ranges 
from his outgoing responses. Circa BIND 9.7-ish, there used to be a 
focused way to do this (deny-answer-addresses?), but I think the more 
"modern" way to accomplish the same thing is with RPZ.


- Kevin

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Blocking private addresses with a optionq

2013-03-14 Thread Niall O'Reilly

On 14 Mar 2013, at 16:22, Chris Buxton wrote:

> Well, yes, if the server in question is authoritative for all the data in 
> question. But if it's just a resolver, that may be more difficult.

Fair comment.

I was (perhaps naïvely) being led by my aversion to open resolvers
to assume that any externally-facing name server must be authoritative.

Things might not be that simple.

/Niall

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Blocking private addresses with a optionq

2013-03-14 Thread Chris Buxton

On Mar 14, 2013, at 9:07 AM, Niall O'Reilly wrote:

> 
> On 14 Mar 2013, at 15:57, Chris Buxton wrote:
> 
>> No, I'm pretty sure the OP wants to strip records from responses if the 
>> records are A records referring to private address space (RFC 1918).
>> 
>> I've no idea how you would do this.
> 
>   Other than separate views, with a "trimmed" zone in the external view?

Well, yes, if the server in question is authoritative for all the data in 
question. But if it's just a resolver, that may be more difficult.

Chris Buxton
BlueCat Networks
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Blocking private addresses with a optionq

2013-03-14 Thread Niall O'Reilly

On 14 Mar 2013, at 15:57, Chris Buxton wrote:

> No, I'm pretty sure the OP wants to strip records from responses if the 
> records are A records referring to private address space (RFC 1918).
> 
> I've no idea how you would do this.

Other than separate views, with a "trimmed" zone in the external view?

/Niall

___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Blocking private addresses with a optionq

2013-03-14 Thread Chris Buxton
On Mar 14, 2013, at 3:29 AM, Tony Finch wrote:

> King, Harold Clyde (Hal)  wrote:
> 
>> Is there an option for bind like the allow-recursion {  }
>> For blocking out going records of 10.0.0.0/8 and 192.168.0.0/16 so I could 
>> do a view like:
> 
> I'm not sure what you mean by "blocking out going records" but there are a
> couple of options that might do what you want:
> 
> There is the "blackhole" acl which makes named ignore all requests and
> never send queries to a particular address range.
> 
> There is the server ... { bogus yes; }; clause which stops named from
> sending queries to a particular address range.

No, I'm pretty sure the OP wants to strip records from responses if the records 
are A records referring to private address space (RFC 1918).

I've no idea how you would do this.

Chris Buxton
BlueCat Networks
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RFC 5011 trust anchor rollover status

2013-03-14 Thread Tony Finch
In response to ICANN's consultation on DNSSEC root key rollovers
http://www.icann.org/en/news/public-comment/root-zone-consultation-08mar13-en.htm
I was wondering how to check that a rollover is progressing OK. BIND
doesn't provide much help with this (unless I have missed something) so I
thought it might be useful to write a script to summarize the RFC 5011
managed keys status. Run it with the path to your managed-keys.bind file
as an argument.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.



#!/usr/bin/perl

use warnings;
use strict;

use POSIX qw(strftime);
my $now = strftime "%Y%m%d%H%M%S", gmtime;

sub ext8601 ($) {
my $d = shift;
$d =~ s{()(..)(..)(..)(..)(..)}
   {$1-$2-$3.$4:$5:$6};
return $d;
}

sub getkey ($$) {
my $h = shift;
my $k = shift;
m{\s+(\d+)\s+(\d+)\s+(\d+)\s+[(]\s*$};
$k->{flags} = $1;
$k->{protocol}  = $2;
$k->{algorithm} = $3;
my $data = "(";
while (<$h>) {
s{^\s+}{};
s{\s+$}{};
last if m{^[)]};
$data .= $_;
}
m{ alg = (\S+); key id = (\d+)};
$k->{alg}  = $1;
$k->{id}   = $2;
$k->{data} = $data;
return $k;
}

sub fmtkey ($) {
my $k = shift;
return sprintf "%16s tag %s", $k->{name}, $k->{id};
}

sub printstatus ($) {
my $a = shift;
if ($a->{removehd} ne "1970010100") {
printf " untrusted and to be removed at %s\n", ext8601 
$a->{removehd};
} elsif ($a->{addhd} lt $now) {
printf " trusted\n";
} else {
printf " waiting for %s\n", ext8601 $a->{addhd};
}
}

sub digkeys ($) {
my $name = shift;
my $keys;
open my $d, "-|", qw{dig +multiline DNSKEY}, $name;
while (<$d>) {
next unless m{^([a-z0-9.-]*)\s+\d+\s+IN\s+DNSKEY\s+};
next unless $name eq $1;
push @$keys, getkey $d, { name => $name };
}
return $keys;
}

my $anchor;
while (<>) {
next unless m{^([a-z0-9.-]*)\s+KEYDATA\s+(\d+)\s+(\d+)\s+(\d+)\s+};
my $k = getkey *ARGV, {
name => $1,
refresh  => $2,
addhd=> $3,
removehd => $4,
};
$k->{name} =~ s{[.]*$}{.};
push @{$anchor->{$k->{name}}}, $k;
}

for my $name (keys %$anchor) {
my $keys = digkeys $name;
my $anchors = $anchor->{$name};
for my $k (@$keys) {
if ($k->{flags} & 1) {
printf "%s %s KSK", fmtkey $k, $k->{alg};
} else {
# ZSK - skipping
next;
}
if ($k->{flags} & 512) {
print " revoked";
}
my $a;
for my $t (@$anchors) {
if ($t->{data} eq $k->{data} and
$t->{protocol} eq $k->{protocol} and
$t->{algorithm} eq $k->{algorithm}) {
$t->{matched} = 1;
$a = $t;
last;
}
}
if (not defined $a) {
print " - WARNING NO MATCHING TRUST ANCHOR\n";
next;
}
printstatus $a;
}
for my $a (@$anchors) {
next if $a->{matched};
printf "%s %s ???", fmtkey $a, $a->{alg};
printstatus $a;
}
}
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Building from source and running in chroot environment

2013-03-14 Thread Tony Finch
Spumonti Spumonti  wrote:

> Are there relatively recent instructions on how to build BIND from
> source and run it in a chroot environment? It sounds obvious but
> everything I've come across assumes BIND is provided by some package
> manager or included with the operating system. I'd like to build the
> latest version of BIND and run it in a chroot environment.  I know you
> have to pre-populate the chroot directories but am not entirely clear on
> everything that's needed.

In the chroot you will need:

/dev/random and /dev/urandom

A syslog socket (if you are using syslog) and/or somewhere for named's log
files

Your rndc key

Your named.conf and zone files :-)

If you have a recent OpenSSL you want to use BIND's configure
--without-gost option or copy OpenSSL's "engines" library directory into
the chroot.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


RE: Building from source and running in chroot environment

2013-03-14 Thread Spain, Dr. Jeffry A.
> Are there relatively recent instructions on how to build BIND from source and 
> run it in a chroot environment? It sounds obvious but everything I've come 
> across assumes BIND is provided by some package manager or included with the 
> operating system. I'd like to build the latest version of BIND and run it in 
> a chroot environment.  I know you have to pre-populate the chroot directories 
> but am not entirely clear on everything that's needed.

FWIW, I've been running BIND on Ubuntu, which uses AppArmor 
(https://help.ubuntu.com/12.10/serverguide/apparmor.html) to control file 
access by applications and services. I'm not able to argue the relative merits 
of chroot vs. AppArmor vs. other alternatives such as SELinux and SMACK. But 
stipulating for the moment that AppArmor is a reasonable alternative, it is 
fairly easy to use it with BIND 9 built from source. I start by installing the 
current packaged version of BIND on a snapshotted Ubuntu virtual machine that I 
can subsequently roll back. I save the files /etc/apparmor.d/usr.sbin.named and 
/etc/apparmor.d/local/usr.sbin.named, which I then place in my 
built-from-source BIND 9 installation. For this to work without modifying the 
file user.sbin.named, I use in my build the same ancillary directories that the 
Ubuntu package uses: /etc/bind for configuration files, /var/lib/bind for 
master zone data and DNSSEC keys, and /var/cache/bind for secondary zone data. 
Otherwise y
 ou can modify the file usr.sbin.named, which you should examine in conjunction 
with the AppArmor documentation for the details. You can deconstruct the Ubuntu 
bind9 source package (http://packages.ubuntu.com/quantal/bind9) to see 
everything else that the package installer does to set up BIND 9. Note that 
Ubuntu 13.04 (Raring Ringtail), due to be released in late April, will be the 
first Ubuntu version to include a packaged BIND 9.9.x.

Jeffry A. Spain, Network Administrator
Cincinnati Country Day School
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Blocking private addresses with a optionq

2013-03-14 Thread Tony Finch
King, Harold Clyde (Hal)  wrote:

> Is there an option for bind like the allow-recursion {  }
> For blocking out going records of 10.0.0.0/8 and 192.168.0.0/16 so I could do 
> a view like:

I'm not sure what you mean by "blocking out going records" but there are a
couple of options that might do what you want:

There is the "blackhole" acl which makes named ignore all requests and
never send queries to a particular address range.

There is the server ... { bogus yes; }; clause which stops named from
sending queries to a particular address range.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
Forties, Cromarty: East, veering southeast, 4 or 5, occasionally 6 at first.
Rough, becoming slight or moderate. Showers, rain at first. Moderate or good,
occasionally poor at first.
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: spf ent txt records.

2013-03-14 Thread Noel Butler
On Wed, 2013-03-13 at 19:33 -0700, Dave Warren wrote:
> On 3/13/2013 17:11, Noel Butler wrote:
> 
> > 
> > On Wed, 2013-03-13 at 14:43 -0700, Dave Warren wrote: 
> > 
> > > I almost wouldn't bother with SPF records these days though, except that 
> > > the code was already written.
> > > 
> > 
> > # grep SPF maillog |grep -c '\-all'
> > 2438
> > 
> > # grep SPF maillog |grep -c '\~all'
> > 7509
> 
> 
> Can you compare that against queries to TXT style SPF records?


I'll see what I can do in the morning, its 30 past beer o'clock now




signature.asc
Description: This is a digitally signed message part
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users