In message
,
Corby Bennett writes:
>
> I am running BIND 9.11.0x64 on Windows Server 2012 R2, and hosting over 35K=
> zones. Unfortunately, running on a non-Windows OS is not an option at thi=
> s time.
> Occasionally BIND will stop responding to queries. The service keeps runni=
> ng. Quer
Folks,
Saw something in a previous posting that should be corrected:
> The sticking point seems to be that most DNS providers don't allow zone
> transfers from
> their servers The customers of Dyn are in the same situation.
Actually from personal experience just a few day
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
http://www.five-ten-sg.com/mapper/bind contains links to the source
rpms, and build instructions.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
iEYEAREKAAYFAlgY7CkACgkQL6j7milTFsHodwCfW5pgR7VdbqtMC+L2s/ZzbZLT
tTAAoItBpmn/omCo0/c
I am running BIND 9.11.0x64 on Windows Server 2012 R2, and hosting over 35K
zones. Unfortunately, running on a non-Windows OS is not an option at this
time.
Occasionally BIND will stop responding to queries. The service keeps running.
Query requests are still logged, but responses are never r
On 2016/11/01 14:45, Ben Croswell wrote:
> The other option being having a master owned by your company and then
> setting both external providers to secondary from your master. You to
> maintain control over data and hqve diversity.
Agreed. This works well -- it's what we do.
Cheers,
In article ,
Ben Croswell wrote:
> The other option being having a master owned by your company and then
> setting both external providers to secondary from your master. You to
> maintain control over data and hqve diversity.
Good point, although that means maintaining another service on your o
The other option being having a master owned by your company and then
setting both external providers to secondary from your master. You to
maintain control over data and hqve diversity.
On Nov 1, 2016 10:42 AM, "Barry Margolin" wrote:
> In article ,
> Ben Croswell wrote:
>
> > I think what we
In article ,
Ben Croswell wrote:
> I think what we see as a result of this attack is DNS provider diversity
> being the new buzz phrase. The same as not relying on a single ISP link i
> see more people using multiple DNS providers.
> The size of these attacks will grow as IoT continues to grow.
My co-authors and I wrote a paper about the events at the DNS root servers on
2015-11-30.
On this date, the root servers received a high number of queries (but by far
not as many as Dyn) and since most of the Root letters were using anycast, we
were able to observe how this had an impact on thei
9 matches
Mail list logo