similar to: freebsd-update not pulling in BIND update

Displaying 20 results from an estimated 300 matches similar to: "freebsd-update not pulling in BIND update"

2006 Sep 06
1
FreeBSD Security Advisory FreeBSD-SA-06:20.bind
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:20.bind Security Advisory The FreeBSD Project Topic: Denial of Service in named(8) Category: contrib Module: bind Announced: 2006-09-06
2016 Aug 09
2
BIND as DNS Slave of SAMBA 4 Internal DNS and Windows 2008
On Mon, Aug 8, 2016 at 5:49 AM, Stefan Kania <stefan at kania-online.de> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > you should set up a dns-proxy and use this proxy as forwarder in your > domains Really, really not the same thing as a DNS slave. If your DNS master, such as your Samba or AD server, goes toes up for whatever reason, the DNS slave can continue
2007 Aug 01
3
FreeBSD Security Advisory FreeBSD-SA-07:07.bind
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-07:07.bind Security Advisory The FreeBSD Project Topic: Predictable query ids in named(8) Category: contrib Module: bind Announced:
2007 Aug 01
3
FreeBSD Security Advisory FreeBSD-SA-07:07.bind
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-07:07.bind Security Advisory The FreeBSD Project Topic: Predictable query ids in named(8) Category: contrib Module: bind Announced:
2016 Aug 10
0
BIND as DNS Slave of SAMBA 4 Internal DNS and Windows 2008
As explained in some other thread here you can set up a Bind server with zone type forward for that DNS server forward every requests to your DC (declared as forwarders in these zones). No need of proxy, no need of building master/slaves, just add: zone "domainwin.com" IN { type forward; forward only; forwarders { <IP of some DC in that domain>; <IP of some other
2016 Aug 08
3
BIND as DNS Slave of SAMBA 4 Internal DNS and Windows 2008
hi guys i need some advice for my case that i faced here.. i have Two AD with two different domain, platform and network : i expect all user in different domain can resolve the other domain dns let say 1. domainwin.com >> windows 2008 AD >> 172.16.1.2 2. domainnux.com >> Samba 4 AD >> 172.16.2.2 is it possible if i create 1 new BIND DNS Server in 172.16.3.2
2019 Feb 13
3
DNSSEC Questions
On 2/12/19 10:55 PM, Alice Wonder wrote: > DNSSEC keys do not expire. Signatures do expire. How long a signature > is good for depends upon the software generating the signature, some > lets you specify. ldns I believe defaults to 60 days but I am not sure. > > The keys are in DNSSKEY records that are signed by your Key Signing > Key and must be resigning before the signature
2005 Jun 29
10
TCP Snoop & wrapper shell script posted
Hi , I have posted DTrace script to snoop tcp traffic and also provided a wrapper script for it to filter out unwanted traffic. http://blogs.sun.com/roller/comments/raviswam/Weblog/tcp_snoop_using_dtrace Please let me know if you have any feedback/comments on this. Thanks Ravi
2006 May 08
13
monitoring tcp writes
i''m using the following probe to calculate how many bytes are being written by tcp write calls, by process and total: fbt:ip:tcp_output:entry { this->tcpout_size = msgdsize(args[1]); @tcpout_size[execname] = sum(this->tcpout_size); @tcpout_size["TOTAL_TCP_OUT"] = sum(this->tcpout_size); } I run this probe for N seconds. I suppose that if i get the
2019 Feb 13
0
DNSSEC Questions
On 2/12/19 11:49 PM, Paul R. Ganci wrote: > > On 2/12/19 10:55 PM, Alice Wonder wrote: >> DNSSEC keys do not expire. Signatures do expire. How long a signature >> is good for depends upon the software generating the signature, some >> lets you specify. ldns I believe defaults to 60 days but I am not sure. >> >> The keys are in DNSSKEY records that are signed
2011 Sep 11
15
How To Expand an .erb Template Without Doing a Full Puppet Run?
We use puppet to distribute named zone files, like many of you do. We use git to maintain these files, which are then pulled by the puppet master machine. These zone files are actually puppet template .erb files. The other day, I made a mistake which resulted in some zone files with syntax errors in them. Puppet faithfully distributed the erroneous zone files to the name servers, which killed
2022 Dec 31
1
rewrite manpages to mdoc(7)
Dear authors of NSD, currently, the manpages that come with NSD are written in the traditional man(7) markup language. I am proposing to rewrite them into the semantic markup of the mdoc(7) language. I am willing to do the work. See a version of nsd-checkzone.8 below as an example. Both the man(7) and mdoc(7) languages have been around for decades, and are supported by the prevalent formatters:
2019 Feb 13
2
DNSSEC Questions
Last weekend I had my DNSSEC keys expire. I discovered that they had expired the hard way... namely randomly websites could not be found and email did not get delivered. It seems that the keys were only valid for what I estimate was about 30 days. It is a real PITA to have update the keys, restart named and then update Godaddy with new digests. The first part of the problem is fairly
2015 Apr 16
3
WG: Samba 4.1.7 /Centos 6 with bind-dlz ERROR: fialed to find dnsRecord for DC
No idea!?? EDV Daniel M?ller Leitung EDV Tropenklinik Paul-Lechler-Krankenhaus Paul-Lechler-Str. 24 72076 T?bingen Tel.: 07071/206-463, Fax: 07071/206-499 eMail: mueller at tropenklinik.de Internet: www.tropenklinik.de -----Urspr?ngliche Nachricht----- Von: Daniel M?ller [mailto:mueller at tropenklinik.de] Gesendet: Mittwoch, 15. April 2015 14:40 An: 'samba-bounces at
2006 Mar 18
2
IPSEC with MAC/MLS support crack
Hi, When I use FreeBSD-6.0 Release (also FreeBSD-5.4), I found IPSEC can't coexists with MAC. When the IpSec is setup, and we connects the TCP server with IPSEC and MAC support, the server innevitably crack. Because the m_pkthdr of some mbuf is mangled by unknown reasons. Following is my kernel configuration: options MAC options MAC_DEBUG options UFS_EXTATTR options
2017 Feb 01
4
Script not running correctly as cronjob
Hi I have a script to resign all DNS zones every two weeks. When i run the script from bash, it works like it should. But when it is executed in cron not. Its starting normal as cronjob: Feb 1 03:00:01 xxx CROND[20116]: (root) CMD (sh /opt/dnssec/resign_dnssec_zones.sh) But after i get a mail that everything is finsihed, but it isn't. 03:04:28 DNSSEC-Signierung abgeschlossen The script
2019 Apr 04
0
[Bug 1332] New: Time-matching extension (--match time) broken by timestamping changes in kernel 4.20 and later
https://bugzilla.netfilter.org/show_bug.cgi?id=1332 Bug ID: 1332 Summary: Time-matching extension (--match time) broken by timestamping changes in kernel 4.20 and later Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal
2017 Feb 01
1
Script not running correctly as cronjob
Thank you for the hints I modified like you described. I also moved the permission part out of the loop (once at the end of the script is enough). Now with the "set -x" the script is working also in cron. Best regards Daniel -----Original Message----- From: CentOS [mailto:centos-bounces at centos.org] On Behalf Of Tony Mountifield Sent: Wednesday, February 1, 2017 11:04 AM To:
2013 Aug 24
5
[Bug 847] New: Owner matching fails on listening socket
https://bugzilla.netfilter.org/show_bug.cgi?id=847 Summary: Owner matching fails on listening socket Product: netfilter/iptables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) AssignedTo:
2017 Feb 01
0
Script not running correctly as cronjob
In article <86827d81f1944333ae213f2d3f19856a at 2sic.com>, Daniel Reich <Daniel.Reich at 2sic.com> wrote: > Hi > > I have a script to resign all DNS zones every two weeks. When i run the script from bash, it works like it should. But > when it is executed in cron not. Its starting normal as cronjob: > Feb 1 03:00:01 xxx CROND[20116]: (root) CMD (sh