Re: Conflicting glue records?

2009-01-08 Thread Dawn Connelly
Right, but his question was regarding the host record for the name
server. You tell the registrar the name and IP address of the name
servers that are authoritative for the domain. The registrar then
pushes those glue records to the root servers. Root doesn't care what
the name and/or IP address of the name servers are. They are unrelated
across domains. There isn't any cross domain verification. If you say
that the FQDN and IP address of the authoritative name server is
something, the registrar believes you and tells root. Root believes
the registrar. The registrar and root don't do a lookup on the FQDN of
the name server that is provided- hence it being called a glue record.
You have to manually enter that data. At least that has been the case
with ever registrar I've dealt with.

On Thu, Jan 8, 2009 at 12:31 AM, Matus UHLAR - fantomas
uh...@fantomas.sk wrote:
 On Wed, Jan 7, 2009 at 6:29 PM, Milo Hyson m...@cyberlifelabs.com wrote:
  If different registrars contain different host records for the same name
  server, what glue records are established in the root servers? Suppose two
  domains at different registrars both list ns1.mydomain.com as a nameserver
  but each gives a different IP. Are the results undefined? Is there some 
  rule
  that is followed to resolve the conflict?

 On 07.01.09 19:14, Dawn Connelly wrote:
 Each registrars push the information that they have. So if you have
 apples.com with an NS record of ns1.dns.com==137.161.0.1 and
 oranges.com with a NS record of ns1.dns.com=137.161.0.2

 I think only the registrar of dns.com should provide glue records for
 anything below dns.com. If it happend this way, it's imho broken.

 --
 Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
 Warning: I wish NOT to receive e-mail advertising to this address.
 Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
 Where do you want to go to die? [Microsoft]
 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Secondary and TLD not updating

2008-11-18 Thread Dawn Connelly
Hey, maybe it's time to agree to disagree on this one? If Bert and Ernie can
live together in roommate bliss, I'm sure we can all accept and appreciate
each others differences.

On Mon, Nov 17, 2008 at 7:47 PM, Kevin Darcy [EMAIL PROTECTED] wrote:

 [EMAIL PROTECTED] wrote:

 Just because individual records are public doesn't mean you should allow
 just anyone to configure their nameserver as a slave to your domain.
 There's no benefit to allowing transfers to just anybody except for the
 allowance it makes for the laziness of admins.


 Incorrect. I've often AXFR'ed people's zones to help troubleshoot problems
 they've reported.

 Weigh that against the  risks of DoS attacks, and the sucking up of
 previous upload bandwidth by domain transfers out.  Each such transfer could
 well use many many queries worth of bandwidth.

 Individual queries of every record in the zone consumes as much or even
 more bandwidth.

 Moreover, if a would-be hacker were to start *guessing* at names in the
 zone, then the total query traffic might actually be *substantially* larger
 than the zone transfer would be.

 (If Intrusion Detection/Prevention is in place, the hacker could fly under
 the radar horizon by spreading the queries over a moderately-long period of
 time, from different clients in a botnet, but the aggregate traffic might
 still be higher than an AXFR).

 Perhaps you don't understand that AXFRs are TCP. So reflection attacks
 aren't really an issue, and the usual concerns about
 DoS-amplification-via-reflector are misplaced.

 Admittedly, if one has exceptionally large RRsets in a given zone (e.g.
 using TXT RRs as a kind of _ad_hoc_ database), then allowing AXFRs might
 enable the hackers to find those RRsets and use them for amplification in
 subsequent DoS attacks. But the moral of that story is that one shouldn't
 use DNS as a generic distributed database, not that open AXFRs are
 inherently a security vulnerability.

 We never experienced any problems with having zone transfers completely
 open, for years. I realize that's just anecdotal evidence, but, on the other
 hand, are there any documented cases where open AXFRs were actually used in
 any kind of attack? If not, then I call FUD.


 Its one more potential vulnerability with no particular benefit.  Sounds
 like a poor trade to me.

 That's one opinion. I cited a particular benefit above. Another benefit
 is that maintaining lists of authorized slaves, potentially on a
 zone-by-zone basis, complicates named.conf and, as we all know, complicated
 configs lead to a higher risk of error, which can itself lead itself to
 security breaches.

 - Kevin

  --Original Message--
 From: Res
 Sender: [EMAIL PROTECTED]
 To: Jefferson Ogata
 Cc: bind-users@lists.isc.org
 Subject: Re: Secondary and TLD not updating
 Sent: Nov 17, 2008 4:20 PM

 On Mon, 17 Nov 2008, Jefferson Ogata wrote:



 On 2008-11-17 14:25, Holger Honert wrote:


 Chris Thompson schrieb:


 On Nov 17 2008, Res wrote:


 Ack! allow-transfer should never be any


 What, never? Why not?



 Security issue! You really want everyone to download your zone(s)?


 I couldn't care less. If the security of my systems were the least bit
 dependent on keeping DNS records secret, I would kinda suck as an admin,
 wouldn't I?




 does your employer know this is your attitude? he/she might take a
 different stand :) I know you'd no longer be working for me, if that was
 your take on how things should be.





 ___
 bind-users mailing list
 bind-users@lists.isc.org
 https://lists.isc.org/mailman/listinfo/bind-users




-- 
Google for President
YouTube for VP
in any year divisible by 4
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users