Sponsored Content
Special Forums Cybersecurity Dns cache poisoning upgrade to bind9.5.0p2 Post 302224668 by amsct on Wednesday 13th of August 2008 04:02:25 PM
Old 08-13-2008
Depending on your current Bind versions, you might need to specify some configuration items explicitly inside the options block in named.conf:

- allow-query and allow-transfer
- check-names
- minimal-responses
- transfer-format
See Upgrading DNS Bind to 9.5.0 p2 | Unixplaza Blog
 

4 More Discussions You Might Find Interesting

1. IP Networking

how can we spoof ethernet by ARP cache poisoning on unix through a program

how can we spoof ethernet by ARP cache poisoning on unix through a program... can anyone post the source code to achieve this... (1 Reply)
Discussion started by: ud4u
1 Replies

2. IP Networking

DNS upgrade issues, bind9.5.0_P1

so we had bind 9.3.0... we upgraded to 9.5.0 patch 1 we kept the exact same named.conf now we have a problem that some DMZ server cant do lookups from our DNS slave anymore. in the named.log we see things like this: 22-Jul-2008 16:05:04.694 security: info: client <our DMZ servers... (2 Replies)
Discussion started by: robsonde
2 Replies

3. Solaris

Bind9 DNS on Solaris 10 x4270 & CPU usage

I have configured a Bind9 DNS on a X4270 machine with Solaris10 I am excuting some repformance tests with DNSPERF tool and maximun CPU usage is 23%. I have seen with prstat -L -p PID that named process usses only 2 of the 8 available CPU at the same time although threads for all CPUs exist.... (2 Replies)
Discussion started by: parisph
2 Replies

4. Solaris

DNS Cache Problem-Urgent !!!!!!

I have DNS Server running in solaris 10 . There is website called exaple.com ,whcih was hosted in this dns server with IP 1.2.3.4 ,now we deleted the DNS entry of that website from our DNS Server (db.exmaple.com is deleted from named.conf ) and it is hosted with some other name server with IP... (1 Reply)
Discussion started by: sandeep.tk
1 Replies
ZONE2SQL(8)						      System Manager's Manual						       ZONE2SQL(8)

NAME
zone2sql - Convert ISC Bind zones to SQL SYNOPSIS
zone2sql [OPTIONS] DESCRIPTION
Zone2sql parses Bind named.conf files and zonefiles and outputs SQL on standard out, which can then be fed to your database. zone2sql understands the Bind master file extension '$GENERATE' and will also honour '$ORIGIN' and '$TTL'. For backends supporting slave operation (currently only the PostgreSQL backend), there is also an option to keep slave zones as slaves, and not convert them to native operation. By default, zone2sql outputs code suitable for the mysqlbackend, but it can also generate SQL for the Generic PostgreSQL and Oracle back- ends. OPTIONS
Input options: --named-conf=<filename> Read <filename> to get the bind configuration --zone=<zone-file> Parse only this zone file. Conflicts with --named-conf parameter. --zone-name=<name> When parsing a single zone without $ORIGIN statement, set this as the zone name. Output options: --bare Output in a bare format, suitable for further parsing. The output is formatted as follows: domain_id<TAB>'qname'<TAB>'qtype'<TAB>'content'<TAB>prio<TAB>ttl --gmysql Output in format suitable for the default configuration of the Generic MySQL backend. --gpgsql Output in format suitable for the default configuration of the Generic PostgreSQL backend. --mysql Output in format suitable for the default configuration of the MySQL backend (the default output format). --oracle Output in format suitable for the default configuration of the Generic Oracle backend. --transactions For Oracle and PostgreSQL output, wrap each domain in a transaction for higher speed and integrity. Other options: --slave Maintain slave status of zones listed in named.conf as being slaves. The default behaviour is to convert all zones to native opera- tion. --on-error-resume-next Ignore missing files during parsing. Dangerous. --help List all options --verbose Be verbose during conversion. SEE ALSO
pdns_server(8) PowerDNS December 2002 ZONE2SQL(8)
All times are GMT -4. The time now is 08:36 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy