h this
could be done by simply turning off DNSSEC for a /particular/ zone. That
could be useful for MANY various types of internal zones that need this.
But if this is that case, how would that DNS Delegation look, to get the
above forwarding example to work using delegation instead?
Thanks in
away? And the forwarder will start working? (even
though rbldnsd doesn't do DNSSEC)
That would be EXCELLENT news! Or, if that doesn't actually fix my
problem, do you have any suggestions that actually address my actual
question?
Rob McEwen
On 9/10/2020 7:37 PM, Mark Andrews wrote:
.local is for
tainers of BIND didn't anticipate that
there might be local-data situations where sys admins should be given
the ability to turn DNSSEC off for a particular zone. Your answers are
helping me to understand HOW/WHY such decisions were made. But
rigidity/purity doesn't always equal wisdom/intelligenc
g else under the sun involving
BIND, but I didn't see anything specifically about that. Do you have a
link for that? I'll try to research that more to try to figure out what
exactly you were suggesting.
Rob McEwen
On 9/11/2020 1:32 AM, Mark Andrews wrote:
On 11 Sep 2020, at 15:04, Rob McEwen wrot
ecord on my cloudflare telling the world that
THIS server is the authoritative server for "example.invaluement.com"
(with TTL for some hours). Do you think that would work?
--
Rob McEwen
https://www.invaluement.com
+1 (478) 475-9032
___
Please
such a repository can't be done securely, and is
therefore disabled by default.
...but I'll work through those and ask a follow-up if I get stuck. Sorry
for the noise - I can't believe I missed that extra page.
Rob McEwen
On 11/9/2020 2:18 AM, Rob McEwen wrote:
Several weeks ago, Mark Andrews gave me
/ having to download
and compile the source code?
--
Rob McEwen, invaluement
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
ISC funds the development of this software with paid support subscriptions.
7 matches
Mail list logo