I installed bind9 at localhost so that I could setup forwarders for our LAN dns servers + for my Unix dns servers in DMZ ( I don’t have access to configure the LAN dns server, which would be a better option) . I setup something like this in /etc/bind/named.conf.local (Debian type of distro):
zone "windows.domain.servers." IN { type forward; forward only; forwarders { 10.0.0.1; 10.0.0.2; }; }; zone "unix.dmz.servers." IN { type forward; forward only; forwarders { 192.168.0.1; }; };
domain names and forward ip’s has been changed .
With this setup, I could configure my workstation to use localhost for dns queries, and tell /etc/resolv.conf to search for both the domains I want regular access to without typing the fqdn .
But there was a problem getting answers from my unix dns server in DMZ, /var/log/syslog told me something like:
Nov 15 09:27:07 uranus named[8184]: validating @0x7f94784dgd70: unix.dmz SOA: got insecure response; parent indicates it should be secure Nov 15 09:27:07 uranus named[8184]: error (no valid RRSIG) resolving 'lb01.unix.dmz.servers/DS/IN': 192.168.0.1#53 Nov 15 09:27:07 uranus named[8184]: error (no valid DS) resolving 'lb01.unix.dmz.servers/A/IN': 192.168.0.1#53
Since I haven’t got time to debug this stuff in detail, I simply edited /etc/bind/named.conf.options and setup
dnssec-validation no;
And my localhost bind9 could resolv stuff from our DMZ
Thnx isc.org and
groups.google.com