Displaying 20 results from an estimated 1000 matches similar to: "Best practices to switch from BIND to NSD"
2024 Apr 25
3
NSD 4.10.0rc1 pre-release
NSD 4.10.0rc1 is available:
https://nlnetlabs.nl/downloads/nsd/nsd-4.10.0rc1.tar.gz
sha256 ad476e82eee5bdabc985e071cabe6a68263dd02eac6278ce2f81798b8c08f19f
pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.10.0rc1.tar.gz.asc
Version 4.10.0 integrates simdzone and drops the Flex+Bison zone
parser.
NSD used a Flex+Bison based zone parser since version 1.4.0. The parser
served NSD well, but zones have
2003 Nov 06
2
ANNOUNCEMENT: NSD 1.4.0 alpha 1
This release is an alpha release. We are currently not planning to have a
1.4.0 stable release as we want to prioritize implementing DNSSEC first.
The next stable release will then be NSD 2.0.0 with DNSSEC support.
This release has some major changes: the database format is much more
compact, responses are generated on-the-fly instead of being precompiled in
the database, and the new
2008 May 16
1
error: failed reading from tcp: Connection reset by peer
All,
I see the following message fairly frequently in our nsd.log files:
error: failed reading from tcp: Connection reset by peer
A quick grep through the source code reveals that this log message comes
from server.c, and can come pretty much at any time during a TCP query.
Since:
- This condition occurs during normal operation, and
- There is nothing a server operator can do about it.
I
2022 Dec 31
1
rewrite manpages to mdoc(7)
Dear authors of NSD,
currently, the manpages that come with NSD
are written in the traditional man(7) markup language.
I am proposing to rewrite them into the semantic markup
of the mdoc(7) language. I am willing to do the work.
See a version of nsd-checkzone.8 below as an example.
Both the man(7) and mdoc(7) languages have been around for decades,
and are supported by the prevalent formatters:
2012 Jul 18
4
Unsecured zone transfers and open resolvers
Hello,
My question is not related to NSD in particular, but I have seen here on
the list a lot of people that work for TLDs and other Registrars and
Registry operators I thought it would be a good place to ask this
question. It is about DNS though, not completely off topic :).
I have encountered in my DNS studies a few name servers that let you
transfer zones they are authoritative for. The
2024 Dec 28
2
NSD stops forking with newer zone data
hi,
On 2024-12-27 22:32, Fredrik Pettai via nsd-users wrote:
> Hello,
>
> It seems our NSD secondary has triggered some sort of intermittent bug
> After several weeks/months of running nsd stops forking with the new
> zone data.
>
> A manual nsd-control transfer or even nsd-control force_transfer won?t
> work, only restart of nsd solves the problem.
> The only
2024 Jan 11
1
support for ALIAS records
While SVCB/HTTPS provides a better solution for the browsing use case, I see other use cases where ALIAS/ANAME would be ideal, notably in apex RRs.
So while fostering SVCB/HTTPS deployment is a good thing, I wouldn?t mind name server software implementing ALIAS. Including NSD, but I reckon it?s much more challenging to do due to NSD architecture than it was to implement it in PowerDNS.
But if
2024 Oct 16
1
SIGSEGV in rbtree_find_less_equal
Hi Chris,
I've properly started looking into this yesterday. NSD definitely
shouldn't crash, still working on that.
However, the provided zone is invalid too(?) I'm not the foremost
expert on NSEC3 (or even DNSSEC), but is seems an NSEC3 is missing for
bar.foo.com. Empty non-terminals should still have an NSEC3 RR.
(Of course, the delegation point should be at bar.foo.com. too and
2013 Nov 29
2
nsd 4.0 EAGAIN loop in sendmmsg(2)
On NetBSD 6.99.28-CURRENT, nsd 3.2.16 works fine, however nsd 4.0.0 is
spinning chewing CPU. The logs show:
Nov 28 23:07:00 xxx nsd[466]: sendmmsg failed: Resource temporarily
unavailable
ktruss shows it getting EAGAIN from sendmmsg(2) over and over again.
According to the man page:
[EAGAIN|EWOULDBLOCK]
The socket is marked non-blocking and the requested
2012 Nov 28
1
Build error of NSD4 on Debian Squeeze
Hello World,
I am trying to build NSD4 on Debian Squeeze and I get the following
errors when running `make`.
```
$ pwd
/home/wiz/src/nsd/tags/NSD_4_0_0_imp_5
$ make
[... output omitted ...]
gcc -g -O2 -o nsd-checkconf answer.o axfr.o buffer.o configlexer.o
configparse
acket.o query.o rbtree.o radtree.o rdata.o region-allocator.o tsig.o
tsig-opens
4_pton.o b64_ntop.o -lcrypto
configparser.o: In
2024 May 17
1
query: bad tsig signature for key
hi,
At least with a recent version if it is a time sync issue nsd will do a specific log msg that.
Laura,
can you send over the actual configuration?
(maybe replacing the key with a placeholder or rotating the keys afterwards)
It sounds strange if nsd checks tsig on the notify, but allow xfr without it.
Regards,
Tam?s
May 16, 2024 16:14:59 Anand Buddhdev via nsd-users <nsd-users at
2024 Oct 08
1
SIGSEGV in rbtree_find_less_equal
Hi Chris,
I'm having trouble trying to reproduce the issue locally.
Like you I configure two zones.
zone:
name: example.com.
zonefile: example.com.zone.signed
zone:
name: bar.example.com.
zonefile: bar.example.com.zone
The file bar.example.com.zone does not exist. After touching and
reloading the signed zone, no segfault occurs. I've tried with and
without the
2024 Oct 09
1
SIGSEGV in rbtree_find_less_equal
Hi Chris,
I can reproduce with your zone. Thanks!
Best,
Jeroen
On Tue, 2024-10-08 at 14:07 +0000, Chris LaVallee wrote:
>
> Hi Jeroen,
>
>
> Attached is the zone I used. Did you add the record for a.bar ?
>
>
> Ex:
>
>
> a.bar ? 300 ? ? IN ?NS ? ? ?ns.somewhere.net.
>
>
> Chris
>
>
>
>
>
>
>
>
>
>
>
2007 Aug 06
2
NSD reload
Hi there!
I remember reading that you cannot reload new zone files on the fly and require a full restart of the nsd daemon? We are evaluating multiple DNS servers that have better performance comparing to bind, but will require quite heavy zone reload (new and existing) every 10 minutes or so. Downtime (even 1-3 secs) is not the option. Thanks!
2024 Jan 11
1
support for ALIAS records
Hi Christof!
AFAIK, PowerDNS is the only open source name server that supports ALIAS. There was an idea to standardize ALIAS as "ANAME" (https://datatracker.ietf.org/doc/draft-ietf-dnsop-aname/), but the idea was dropped in favor of SVCB/HTTPS record https://datatracker.ietf.org/doc/rfc9460/. So now we have to wait until all Browser vendors implement SVCB/HTTPS.
Regards
Klaus
PS: If
2023 Apr 24
1
nsd issue
Hi Jean Claude,
The message is printed when the bind operation failed. Why that happens
is hard to say, I'd need more information for that. As the message does
not say: address already in use (or similar), I'm guessing the address
is not configured?
Best regards,
Jeroen
On Fri, 2023-04-21 at 18:03 +0200, HAKIZIMANA Jean Claude via nsd-users
wrote:
> Dear nsd Users,
> kindly can
2024 Oct 08
1
SIGSEGV in rbtree_find_less_equal
Hi Jeroen,
Attached is the zone I used. Did you add the record for a.bar ?
Ex:
a.bar 300 IN NS ns.somewhere.net.
Chris
________________________________
From: Jeroen Koekkoek <jeroen at nlnetlabs.nl>
Sent: Tuesday, October 8, 2024 5:33 AM
To: Chris LaVallee <clavallee at edg.io>; nsd-users at lists.nlnetlabs.nl <nsd-users at lists.nlnetlabs.nl>
Subject: Re:
2025 Jan 04
1
Old-main quit during quit sync
Hi all,
I'm running NSD 4.9.1 on OpenBSD 7.6. I recently upgraded from OpenBSD
7.5, which I believe had NSD 4.8.0 in base, and did not see this
behavior prior.
When I try to reload a zone using nsd-control, I am seeing an error
message in my logfile: "error: reload: old-main quit during quit sync"
This error does not appear to happen every time I run reload, but it
does get
2013 Mar 11
1
nsd4 process weirdness?
Hi,
I was playing with the munin plugin in nsd4 beta4, and saw some strange
errors. Directly after starting nsd on linux, I'm seeing:
$ ps ax -o pid,ppid,user,args | grep nsd
1638 1 nsd /usr/sbin/nsd -c /etc/nsd/nsd.conf
1641 1638 nsd /usr/sbin/nsd -c /etc/nsd/nsd.conf
1647 1641 nsd /usr/sbin/nsd -c /etc/nsd/nsd.conf
$ sudo munin-run nsd_munin_memory
2024 Feb 27
2
About timestamps in logs and zonestatus
Dear All,
Please help me understand why timestamps in logs are different from those
in nsd-control zonestatus output:
served-serial: "2024022603 since 2024-02-27T08:07:51"
commit-serial: "2024022603 since 2024-02-27T08:07:51"
Feb 26 18:47:34 slave-server nsd[780]: zone testzone.test. received update
to serial 2024022603 at 2024-02-26T18:47:33 from