[dns-operations] Can you force your IPv4/v6 DNS server to return v4 responses only on recursive lookups
Patrick, Robert (CONTR)
Robert.Patrick at hq.doe.gov
Tue Jan 15 23:15:53 UTC 2013
We need an option like this `break-dnssec` feature to use RPZ for stopping user access to DNSSEC-signed domains that are on a block list.
-----Original Message-----
From: dns-operations-bounces at lists.dns-oarc.net [mailto:dns-operations-bounces at lists.dns-oarc.net] On Behalf Of Phil Pennock
Sent: Tuesday, January 15, 2013 5:55 PM
To: McGhee, Karen (Evolver)
Cc: DNS Operations
Subject: Re: [dns-operations] Can you force your IPv4/v6 DNS server to return v4 responses only on recursive lookups
On 2013-01-15 at 15:11 -0500, McGhee, Karen (Evolver) wrote:
> I should have said, the name server is BIND 9.8 running on RHEL5.5.
There's a configure-time option to bind9, `--enable-filter-aaaa`. _If_
it was given, then:
options {
filter-aaaa-on-v4 yes;
};
That won't filter AAAA if DNSSEC records are present; use `break-dnssec`
instead of `yes` if you _really_ want to drop all AAAA records.
I'm assuming you know how connectivity to resolver != connectivity to
end-sites and you're instead just using this as a crude filter for
systems behind middleware that will break _all_ IPv6, and are telling
customers to configure their auth DNS servers via IPv6 address if they
want to be able to reach IPv6-only sites, and if the customers are
internal, you're providing a way for them to modify the DHCP assignment
they'll get, to manage this.
And that you have a transition plan to get the non-IPv6 customers fixed
before DNSSEC rolls out to enough sites that validating forwarding
resolvers run by your customers won't break for the IPv4-only customers
(which might, of itself, be a crude hammer to encourage fixes).
-Phil
More information about the dns-operations
mailing list