A
a bind guy
does w2k or w2k3 dns support these features or are they
capable of doing these
capable of doing these
a bind guy said:does w2k or w2k3 dns support these features or are they
capable of doing these
host zones that have unlisted but authoritative name
servers.
the hidden master can be used for security and other
reasons; the stealth slave can be a very interesting
concept for the MS world, as normally a great number of
You couldn't use AD integrated for a true hidden master, AD integrated zonesthe bind guy said:thanks williams. A real hidden primary
means no NS record for the primary on both the primary
and secondaries. In addition, the primary info should not
be revealed in the MNAME part of the SOA record.
that can be done easily in the case of standard primary
and secondries, as you just said.
however, is it also doable for AD integrated zones?
would DDNS add difficulties to this?
a bind guy said:thanks Ace for trying, but what you described is not what
the well known concepts about on the other side of the
DNS world.
basically the issue boils down to whether Windows DNS can
host zones that have unlisted but authoritative name
servers.
the hidden master can be used for security and other
reasons; the stealth slave can be a very interesting
concept for the MS world, as normally a great number of
servers exist in a zone of MS implementation -- a
possible problem for NOTIFY.
thanks williams. A real hidden primary
means no NS record for the primary on both the primary
and secondaries.
In addition, the primary info should not
be revealed in the MNAME part of the SOA record.
however, is it also doable for AD integrated zones?
would DDNS add difficulties to this?
even though they are secondary of the hidden master.
Hidden masters and their secondary servers must also support notify.
the secondary servers don't have a record for the master, the master must be
capable of notifying the secondary to do a zone transfer.
William Stacey said:Right. AFIK that is the only way you have to configure it. You need
to delete the primary NS record in the primary zone so the
secondaries don't get it during xfr.
Can change that to what you want.
It does and that is why I don't recommend this. It has similar
issues with using an AD zone for public use - also not recommened for
similar reasons. You can end up turning off all auto updates from
Netlogin, DNS, etc, and add all the (ns, soa, etc.) manually and AD
wont keep changing them, but IMO this is hacking the machine and will
end up with more issues then you solve. If you have a "need" for this
with AD, why not setup a forward zone in the public server pointing
to the primary behind your firewall. I have never seen a need to
publish private names and IPs to the public side (unless these
"private" side records are actually public IPs in the DMZ or
something.)
William Stacey said:Thanks Kevin. Just thinking...(ouch, ouch)... Not real sure the
mname even matters at that point. A client would only need a good
mname to do an update. I think this is true...would like to know any
other need for it in this case. Not sure it even needs to be
resolvable.
May I ask why?
in a hidden master scenario the MNAME record points to a secondary zone.
There are no records that actually point to the primary master. ....
I use a hidden master myself, there are no records for the primary, even the
SOA does not reflect the name of the master nameserver. I use the notify
option to notify the Secondry nameservers to do a zone transfer.
Without using notify, then you must use the master as Primary on the SOA.
the nameserver tab, would required a reg entry. I've seen in some cases,
-----Original Message-----
In a bind guy <[email protected]> posted their thoughts, then
The "other" side?
Hmm... so you're saying I'm in the dark?
I see...
Maybe you're doing something wrong configuring it?
As William asked, post what you're doing and what you're seeing that is
making YOU come to the conclusion that MS DNS doesn't support this.
Views are available on BIND 9 and I think the majority ofLet's see what you;re talking about. MS DNS is fine for the most part. The
only major thing different is "views" but that leads to mixing private and
public data on the same box, and as you seem to be a person of security
conscience, I'm sure you wouldn't want to mix private and public data on the
same machine anyway.
-----Original Message-----
In William Stacey [MVP] <[email protected]> posted a question
Secondary servers have two ways of getting zone updates.
1. using the MNAME record to connect to the primary name server. Problem is
in a hidden master scenario the MNAME record points to a secondary zone.
There are no records that actually point to the primary master.
2. The actual master server can notify the secondary servers to update their
records.
Without using notify, then you must use the master as Primary on the SOA.
a bind guy said:Both of the above two are not true. the secondries have
to know the IP of the primary to do xfr, and xfrs have to
be intiated by the secondaries, even with NOTIFY.
cannot agree with this. You can put anything you want
there, unless using DDNS.
William Stacey said:Nothing is farther from the truth bind guy (??) . Ace is one of top
people you will find on w2k dns and/or AD issues.
Do you still have a question on this. I think we pointed out you can
have a hidden primary using w2k.
a bind guy said:yeah thanks William. We all learn things through this
kind of discussions. I appreciate everyone's input.
I was thinking a scenario that in a small scope I have
servers for apps, and then with a large environment I
have many users. I'd like to use AD integrated DDNS with
hidden masters for security and simplicity, and then on
the user enviroment to use the standard secondaries, to
provide the DNS services. This could be for an ASP or
just internal side of an enterprise env....
It seems, based on the discussion so far, that using AD
intergrated with DDNS, this kind of implementation does
have some difficulties, right?