Did you try to send your request without the last dot?
Like example.com instead if example.com. <--
Maybe I'm wrong but I noticed the same when I had to implement a sync
between PDNS and our management system.
I assumed I had to end all FQDNs by a dot but that's not the case with
PDNS (which is pe
Hi!
https://doc.powerdns.com/authoritative/guides/alias.html
Is live-signing still unsupported for ALIAS?
Kind regards
Kevin
___
Pdns-users mailing list
Pdns-users@mailman.powerdns.com
https://mailman.powerdns.com/mailman/listinfo/pdns-users
Hi!
The docs state that PDNS does support SNMP. I am unable to find information
on how I can enable it (agent x).
Dnsdist and recursor have docs available.
How do I enable it in Pdns auth?
Kind regards
Kevin
___
Pdns-users mailing list
Pdns-users@mailma
Thanks for the explanation!
This setup is part of a configuration wizard by Flowfact (realestate
management software).
The CNAME is one of the settings that have to be set according to
their tool - it also validates successfully.
The problem is, their tool raises an "unknown error" and the helpdes
Hi!
I've now met a problem where I don't know how to proceed:
===>% ===
C:\Users\kolbrich>nslookup -q=CNAME _
91867ab3c77f152ba4ab0cceeabb3666.expose.graf-borstar.de. 8.8.8.8
Server: dns.google
Address: 8.8.8.8
Nicht autorisierende Antwort:
_91867ab3c77f152ba4ab0cceeabb3666.exp
Hi!
Why is PDNS explicitly using latin1?
https://github.com/PowerDNS/pdns/blob/master/modules/gmysqlbackend/schema.mysql.sql
>From what I understand, utf8mb4 / utf8mb4_unicode_520_ci is the best
charset / collation for MySQL / MariaDB atm.
Sure, PDNS uses IDNA and does not need unicode but wouldn
All three is correct. Only the best would be required but keeping them all
upstream helps with old clients or resolvers, who understand DNSSEC but not
latest crypto.
Kevin
Am Di., 12. März 2019 um 20:14 Uhr schrieb Asanka Gunasekara <
asan...@talkup.com.au>:
> Hi David,
>
> I added all 3 DS key
I have checked the other zone (where it points to) and indeed: there
was a broken record.
Seems like one of the other servers stopped AXFR and served cache
which misleaded me.
Thank you!
Kevin
Am Do., 17. Jan. 2019 um 14:44 Uhr schrieb Kevin Olbrich :
>
> Hi Bert,
>
> there a
uot;.
I did some tests with other zones on the same server, there I was able
to get the correct CNAME.
That's why I don't understand the problem ;-)
Kevin
Am Do., 17. Jan. 2019 um 14:21 Uhr schrieb bert hubert
:
>
> On Thu, Jan 17, 2019 at 02:15:25PM +0100, Kevin Olbrich wrote:
&g
Hi!
I don't know what I am doing wrong here:
Client PC:
C:\Users\kolbrich>nslookup cgn01.example.com. 10.100.0.210
(root)
primary name server = ns01.srvfarm.net
responsible mail addr = dnsnoc.example-it.de
serial = 1
refresh = 10800 (3 hours)
retry = 360
rmation about how your DNS
> data can be figured out using NSEC/NSEC3, it does fail to answer why DNS
> data should be considered private in the first place.
>
> If your security model relies on people not finding out your magical DNS
> record names, you might want consider again.
>
Hi again,
I have now updated to Pdns 4.1.4 and will test if the problem is still
present.
In the meantime I read this doc:
https://dnscurve.org/espionage2.html
Now I am unsure if NSEC3 is the way to go.
What's best practice?
Kevin
Am Mo., 29. Okt. 2018 um 13:14 Uhr schrieb Kevin Ol
Hi!
I read this doc:
https://doc.powerdns.com/authoritative/dnssec/modes-of-operation.html
PowerDNS Authoritative Server 4.1.1
Currently all zones are DNSSEC signed with NSEC by default.
We noticed a problem with non-existent CAA records: The zone is native and
replicated via AXFR to an external
Hi!
I set up two dnsdist instances against an internal authoritative DNS.
To better support our users, I would like to install an intranet site which
explains why a website ist not available (most likely typo).
Is it possible to override NXDOMAIN with an A reply?
Kevin
__
14 matches
Mail list logo