[Pdns-users] Running auth server and recursor on the same server, upgrading from 4.0.9
Yves Goergen
nospam.list at unclassified.de
Tue Jun 23 18:47:36 UTC 2020
Okay, so I'll have to repeat all the domains from the auth server's
database in a static config file? What's the use of the database then?
And then I still have two DNS servers: one that can resolve any public
name, and another one that can resolve the names I host myself. The
recursor is only accessible locally and the auth server is public. What
should I use for the system's default DNS server? If I choose the first,
I cannot resolve my own names locally. If I choose the second, only my
own names work and the rest of the internet is unresolvable.
PowerDNS auth server on port 53 and recursor internally forwarded to
port 5300 worked fine with a single public IP address and port for
queries from local and remote.
-Yves
-------- Ursprüngliche Nachricht --------
Von: Brian Candler <b.candler at pobox.com>
Gesendet: Dienstag, 23. Juni 2020, 20:25 MESZ
Betreff: [Pdns-users] Running auth server and recursor on the same
server, upgrading from 4.0.9
On 23/06/2020 19:07, Yves Goergen via Pdns-users wrote:
I have only one server and one IPv4 address, so using a multi-IP setup
just isn't possible. With the decreased availability of IPv4
addresses, this isn't realistic either.
It's not a problem: your recursor can be behind NAT on a private IP
address. Only your auth server needs to be accessible from the Internet
- and even then, only if you want your domains to be resolvable
externally (in which case, please also read RFC2182 and set up at least
one secondary on a remote network)
So how is this supposed to work? Can I still use PowerDNS or will I
have to find another solution that has the same features as PowerDNS
4.0.9?
dnsdist is overkill here. For a small home network:
- stick your recursor(s) on a private IP
- stick your authoritative on a public IP (if required to be reachable
from outside)
- on your recursor, configure any private non-delegated domains, i.e.
those without NS records in the public DNS, to forward those queries to
the authoritative server.
For example:
forward-zones-file=/etc/powerdns/forward.zones
and in that file you could put:
int.example.com=192.168.1.53
168.192.in-addr.arpa=192.168.1.53
10.in-addr.arpa=192.168.1.53
+.=9.9.9.9
The last line is optional: it says to forward all other queries upstream
to 9.9.9.9 and to request recursion. This is if you want to use an
upstream filtered DNS service. Remove it and your recursor will follow
the DNS delegation tree as normal.
If you don't like this, you might want to use a different DNS server.
PowerDNS is designed for large ISP-scale applications where separation
of recursor and authoritative roles is an absolute must.
HTH,
Brian.
More information about the Pdns-users
mailing list