On 19/07/2019 13:55, bryantz-p...@zktech.com wrote:
If we do the following dig against our dns server we get a failure...
dig -x 65.183.176.179 @ns1.granddial.net
; <<>> DiG 9.9.4-rpz2.13269.14-P2 <<>> -x 65.183.176.179
@ns1.granddial.net
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: REFUSED, id: 30112
That's correct.
That dig -x command sends a query for 179.176.183.65.in-addr.arpa,
asking for PTR.
However, your server is not authoritative for 176.183.65.in-addr.arpa;
it's only authoritative for 160/27.176.183.65.in-addr.arpa.
You need to recursively follow the CNAME in the parent to get to the
expanded name inside your zone.
_______________________________________________
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
https://mailman.powerdns.com/mailman/listinfo/pdns-users