3.0.1 secondary issues.
Måns Nilsson
mansaxel at sunet.se
Tue Sep 19 07:43:09 UTC 2006
Hi,
I'm having a number of problems with my NSD 3. I am trying to serve SE, as
a AXFR client, with the following config file: (some obfuscation
performed.. )
server:
# uncomment to specify specific interfaces to bind (default all).
ip-address: 192.36.125.102
ip-address: 127.0.0.1
ip-address: ::1
# enable debug mode for nsd, does not fork daemon process.
# (debug mode disables slave zone functionalities)
# debug-mode: no
# ip4-only: no
# ip6-only: no
# the database to use
database: "/var/nsd/nsd.db"
# identify the server (CH TXT ID.SERVER entry).
identity: "F.NS.SE"
# log messages to file. Default to stderr and syslog.
logfile: "/var/nsd/nsd.log"
# Number of NSD servers to fork.
# server-count: 1
# Maximum number of concurrent TCP connections per server.
# tcp-count: 10
# File to store pid for nsd in.
pidfile: "/var/run/nsd.pid"
# port to answer queries on. default is 53.
port: 53
# statistics are produced every number of seconds.
statistics: 300
# After binding socket, drop user privileges.
# can be a username, id or id.gid.
username: nsd
# The directory for zonefile: files.
zonesdir: /var/nsd
# The file where incoming zone transfers are stored.
# run nsd-patch to update zone files, then you can safely delete it.
difffile: "/var/nsd/ixfr.db"
# The file where secondary zone refresh and expire timeouts are
kept.
# If you delete this file, all secondary zones are forced to be
# 'refreshing' (as if nsd got a notify).
xfrdfile: "/var/nsd/xfrd.state"
# Number of seconds between reloads triggered by xfrd.
# xfrd-reload-timeout: 10
# Sample zone 1
zone:
name: "se"
zonefile: "/var/nsd/se.zone"
# This is a slave zone. Masters are listed below.
allow-notify: 192.0.2.47 secret-key
request-xfr: 192.0.2.47 secret-key
allow-notify: 192.0.2.11 secret-key
request-xfr: 192.0.2.11 secret-key
# uncomment to provide AXFR to all the world
provide-xfr: 192.36.125.0/24 secret-key
# for nsdc
allow-notify: ::1 NOKEY
allow-notify: 127.0.0.1 NOKEY
key:
name: secret-key
algorithm: hmac-md5
secret: "DEADBEEFDEADBEEF"
The symptoms are that even when I'm manually triggering updates (nsdc
update) there is no zone update performed. The masters are said to be
sending notifies.
The only way I can get new zones in is by stopping NSD, and removing old
data files.
Very little is logged, no notifies, nothing. A 'bash-x nsdc update' yields:
ash-3.00# bash -x nsdc update
+ ulimit -m unlimited
+ ulimit -d unlimited
+ configfile=/etc/nsd/nsd.conf
+ sbindir=/usr/local/sbin
+ ZONEC_VERBOSE=-v
+ test xupdate = x-c
+ nsd_checkconf=
+ '[' -e /usr/local/sbin/nsd-checkconf ']'
+ nsd_checkconf=/usr/local/sbin/nsd-checkconf
+ /usr/local/sbin/nsd-checkconf /etc/nsd/nsd.conf
+ test 0 -ne 0
++ /usr/local/sbin/nsd-checkconf -o database /etc/nsd/nsd.conf
+ dbfile=/var/nsd/nsd.db
++ /usr/local/sbin/nsd-checkconf -o pidfile /etc/nsd/nsd.conf
+ pidfile=/var/run/nsd.pid
+ lockfile=/var/nsd/nsd.db.lock
++ dirname /usr/local/sbin/nsd-checkconf
+ sbindir=/usr/local/sbin
+ noclobber_set='set -C'
+ echo /usr/pkg/bin/bash
+ grep tcsh
+ case "$1" in
+ echo 'Sending notify to localhost to update secondary zones...'
Sending notify to localhost to update secondary zones...
+ '[' -s /var/run/nsd.pid ']'
++ /usr/local/sbin/nsd-checkconf -o zones /etc/nsd/nsd.conf
+ zoneslist=se
+ for zonename in '${zoneslist}'
++ /usr/local/sbin/nsd-checkconf -z se -o allow-notify /etc/nsd/nsd.conf
+ notify_allow='192.0.2.47 secret-key
192.0.2.11 secret-key
::1 NOKEY
127.0.0.1 NOKEY'
+ send_updates se 192.0.2.47 secret-key 192.0.2.11 secret-key
+ local zonename=se
+ shift
++ /usr/local/sbin/nsd-checkconf -o port /etc/nsd/nsd.conf
+ port=53
+ test -n 53
+ port='-p 53'
+ update_sent=no
+ (( 8 > 0 ))
+ ip_spec=192.0.2.47
+ key_spec=secret-key
+ shift 2
+ test Z192.0.2.47 = Z127.0.0.1 -o Z192.0.2.47 = Z::1
+ (( 6 > 0 ))
+ ip_spec=192.0.2.11
+ key_spec=secret-key
+ shift 2
+ test Z1192.0.2.11 = Z127.0.0.1 -o Z192.0.2.11 = Z::1
+ (( 4 > 0 ))
+ ip_spec=::1
+ key_spec=NOKEY
+ shift 2
+ test Z::1 = Z127.0.0.1 -o Z::1 = Z::1
+ secret=
+ test KNOKEY '!=' KNOKEY -a KNOKEY '!=' KBLOCKED
+ test KNOKEY '!=' KBLOCKED
+ /usr/local/sbin/nsd-notify -p 53 -z se ::1
+ update_sent=yes
+ (( 2 > 0 ))
+ ip_spec=127.0.0.1
+ key_spec=NOKEY
+ shift 2
+ test Z127.0.0.1 = Z127.0.0.1 -o Z127.0.0.1 = Z::1
+ secret=
+ test KNOKEY '!=' KNOKEY -a KNOKEY '!=' KBLOCKED
+ test KNOKEY '!=' KBLOCKED
+ /usr/local/sbin/nsd-notify -p 53 -z se 127.0.0.1
+ update_sent=yes
+ (( 0 > 0 ))
+ test yes = no
+ exit 0
Looks like it is doing the right thing. Is it correct that nsd should not
log anything about that?
Am I doing anytrhing blatantly wrong?
--
Måns Nilsson Systems Specialist
+46 70 681 7204 cell KTHNOC
+46 8 790 6518 office MN1334-RIPE
We just joined the civil hair patrol!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 186 bytes
Desc: not available
URL: <http://lists.nlnetlabs.nl/pipermail/nsd-users/attachments/20060919/b79664f3/attachment.bin>
More information about the nsd-users
mailing list