From Marten.Terpstra at ripe.net Mon May 3 13:56:51 1993 From: Marten.Terpstra at ripe.net (Marten Terpstra) Date: Mon, 03 May 93 13:56:51 +0200 Subject: 193.in-addr.arpa procedures -> ripe-85 Message-ID: <9305031156.AA18641@ncc.ripe.net> Folks, The 193.in-addr.arpa delegation procedures have been made into a RIPE document ripe-85. Only changes since version 1.4 are a few typos and cosmetic. You can find it as ftp.ripe.net:ripe/docs/ripe-docs/ripe-85.txt It is now version 1.5. Before asking for a block delegation, please read the document. Cheers, -Marten From Tony.Bates at ripe.net Wed May 5 16:35:24 1993 From: Tony.Bates at ripe.net (Tony Bates) Date: Wed, 05 May 93 16:35:24 +0200 Subject: AS information available via DNS Message-ID: <9305051435.AA24881@ncc.ripe.net> Folks, As one of the actions from the last RIPE meeting we have been thinking about a nice way to have an automatic update procedure based on DNS. As a trial for this an auto-script has been been produced that loads current AS derived data into zonefiles under the domain aut-num.ripe.net. This has two very nice features straight away. It allows you to see a list of networks associated with an AS. For example... [mature-tony-1480] host -lt txt as1104.aut-num.ripe.net AS1104.aut-num.ripe.net TXT 192.16.185.0 AS1104.aut-num.ripe.net TXT 192.16.186.0 AS1104.aut-num.ripe.net TXT 192.16.194.0 AS1104.aut-num.ripe.net TXT 192.16.195.0 AS1104.aut-num.ripe.net TXT 192.16.199.0 AS1104.aut-num.ripe.net TXT 192.87.45.0 I currently use TXT records for the zonefiles (suggestions are welcome if something else is more appropriate ?). Also, you can do more interesting things like perhaps generate access-lists.. For Example... [mature-tony-1482] host -lt txt as1104.aut-num.ripe.net | awk '{ printf ("acces s-list 30 permit %s\n", $3)}' access-list 30 permit 192.16.185.0 access-list 30 permit 192.16.186.0 access-list 30 permit 192.16.194.0 access-list 30 permit 192.16.195.0 access-list 30 permit 192.16.199.0 access-list 30 permit 192.87.45.0 and so on. You can also see what ASes are currently in the RIPE database. host -lt ns aut-num.ripe.net aut-num.ripe.net NS mature.ripe.net AS760.aut-num.ripe.net NS mature.ripe.net AS766.aut-num.ripe.net NS mature.ripe.net AS590.aut-num.ripe.net NS mature.ripe.net NONE-LOCAL.aut-num.ripe.net NS mature.ripe.net AS1717.aut-num.ripe.net NS mature.ripe.net AS2107.aut-num.ripe.net NS mature.ripe.net AS2108.aut-num.ripe.net NS mature.ripe.net AS2111.aut-num.ripe.net NS mature.ripe.net AS1205.aut-num.ripe.net NS mature.ripe.net AS786.aut-num.ripe.net NS mature.ripe.net AS2116.aut-num.ripe.net NS mature.ripe.net AS789.aut-num.ripe.net NS mature.ripe.net AS1213.aut-num.ripe.net NS mature.ripe.net AS2119.aut-num.ripe.net NS mature.ripe.net AS1899.aut-num.ripe.net NS mature.ripe.net AS2122.aut-num.ripe.net NS mature.ripe.net AS1739.aut-num.ripe.net NS mature.ripe.net AS1741.aut-num.ripe.net NS mature.ripe.net AS1923.aut-num.ripe.net NS mature.ripe.net AS1752.aut-num.ripe.net NS mature.ripe.net AS1755.aut-num.ripe.net NS mature.ripe.net AS1241.aut-num.ripe.net NS mature.ripe.net AS2148.aut-num.ripe.net NS mature.ripe.net AS137.aut-num.ripe.net NS mature.ripe.net AS1770.aut-num.ripe.net NS mature.ripe.net AS513.aut-num.ripe.net NS mature.ripe.net AS1257.aut-num.ripe.net NS mature.ripe.net AS2004.aut-num.ripe.net NS mature.ripe.net AS517.aut-num.ripe.net NS mature.ripe.net AS679.aut-num.ripe.net NS mature.ripe.net AS1104.aut-num.ripe.net NS mature.ripe.net AS1267.aut-num.ripe.net NS mature.ripe.net AS1274.aut-num.ripe.net NS mature.ripe.net AS1275.aut-num.ripe.net NS mature.ripe.net AS697.aut-num.ripe.net NS mature.ripe.net AS174.aut-num.ripe.net NS mature.ripe.net AS719.aut-num.ripe.net NS mature.ripe.net AS544.aut-num.ripe.net NS mature.ripe.net AS1290.aut-num.ripe.net NS mature.ripe.net AS2380.aut-num.ripe.net NS mature.ripe.net AS2036.aut-num.ripe.net NS mature.ripe.net AS553.aut-num.ripe.net NS mature.ripe.net AS2043.aut-num.ripe.net NS mature.ripe.net AS1324.aut-num.ripe.net NS mature.ripe.net AS559.aut-num.ripe.net NS mature.ripe.net AS378.aut-num.ripe.net NS mature.ripe.net AS1849.aut-num.ripe.net NS mature.ripe.net NONE.aut-num.ripe.net NS mature.ripe.net AS1853.aut-num.ripe.net NS mature.ripe.net AS565.aut-num.ripe.net NS mature.ripe.net AS224.aut-num.ripe.net NS mature.ripe.net AS60.aut-num.ripe.net NS mature.ripe.net The NONE and NONE-LOCAL zones are not currently loaded. The second aspect of this is the possibilty of having an update procedure based on DNS. Here we could delegate the zone to the "guardian" and if we provided a consistency checking tool to avoid conflicts it would be a nice "dynamic" mechanism for updating AS information. We would like to go this way if you feel using DNS is reasonable as opposed to using some form of login/ftp mechanism as previous used for ripe-60 tags and planned for ripe-81. Please let us know your views on this and also please try looking at the information in the aut-num.ripe.net zone. --Tony From SCHEUN at SARA.NL Thu May 6 09:50:00 1993 From: SCHEUN at SARA.NL (Willem van der Scheun, SARA, +31 20 5923079) Date: Thu, 6 May 93 9:50 MET Subject: AS information available via DNS Message-ID: <9305060750.AA15787@mature.ripe.net> Tony, This sounds at first sight as a good idea. Fairly dynamic and distributed and the like. A remark about the possibility as building access lists and the like. You can do that quite easily of course, but I would like to have one way of building access lists (and BGP network lists for that matter) from the RIPE database. Currently we are using nlc. I would definitely prefer that we have ONE tool to generate the lists. Apart form this other nice solutions may be available. Talking about this, will te the tool the NCC is working upon (as was reported at the last RIPE), be based on nlc, or is it completely new? If you delegate zones should this delegation also be put in the AS object like it is in the domain object? Delegation can not be done to the guardian (I guess that's why you used double quotes). For AS1103 (SURFnet) the guardian is a alias for a list of responsibles. If you put delegation info in the AS info, should this state nserver as well as zone-c and tech-c? Willem From Tony.Bates at ripe.net Thu May 6 13:26:26 1993 From: Tony.Bates at ripe.net (Tony Bates) Date: Thu, 06 May 93 13:26:26 +0200 Subject: AS information available via DNS In-Reply-To: Your message of Thu, 06 May 93 09:50:00 +0700. <9305060751.AA26361@ncc.ripe.net> Message-ID: <9305061126.AA27019@ncc.ripe.net> "Willem van der Scheun, SARA, +31 20 5923079" writes: * Tony, * * This sounds at first sight as a good idea. Fairly dynamic and distributed a * nd * the like. Right. * A remark about the possibility as building access lists and the like. You c * an * do that quite easily of course, but I would like to have one way of buildin * g * access lists (and BGP network lists for that matter) from the RIPE database * . * Currently we are using nlc. I would definitely prefer that we have ONE tool * to * generate the lists. Apart form this other nice solutions may be available. * Talking about this, will te the tool the NCC is working upon (as was report * ed * at the last RIPE), be based on nlc, or is it completely new? Sure - this was only an example of doing things interactively with the information is all. The tools we are working on will be able to make use of nlc also and generate both ASpath lists and network based lists. * * If you delegate zones should this delegation also be put in the AS object l * ike * it is in the domain object? Delegation can not be done to the guardian (I g * uess * that's why you used double quotes). For AS1103 (SURFnet) the guardian is a * alias for a list of responsibles. If you put delegation info in the AS info * , Well the thing is. Whatever way the update is done it will be some form of file maintainence and whether that is here or there, to me at least doesn't make a lot of difference even if it is multiple people maintaining the zone. * should this state nserver as well as zone-c and tech-c? * Possibly if it is decided this is how the update procedure is done. * Willem --T From Havard.Eidnes at runit.sintef.no Mon May 10 23:45:52 1993 From: Havard.Eidnes at runit.sintef.no (Havard Eidnes) Date: Mon, 10 May 1993 23:45:52 +0200 Subject: AS information available via DNS In-Reply-To: Your message of "Wed, 05 May 1993 16:35:24 +0200." <9305051435.AA24881@ncc.ripe.net> Message-ID: <9305102145.AA05671@spurv> > As one of the actions from the last RIPE meeting we have been thinking > about a nice way to have an automatic update procedure based on DNS. As a > trial for this an auto-script has been been produced that loads current > AS derived data into zonefiles under the domain aut-num.ripe.net. This > has two very nice features straight away. It allows you to see a list of > networks associated with an AS. For example... > > [mature-tony-1480] host -lt txt as1104.aut-num.ripe.net > AS1104.aut-num.ripe.net TXT 192.16.185.0 > AS1104.aut-num.ripe.net TXT 192.16.186.0 > AS1104.aut-num.ripe.net TXT 192.16.194.0 > AS1104.aut-num.ripe.net TXT 192.16.195.0 > AS1104.aut-num.ripe.net TXT 192.16.199.0 > AS1104.aut-num.ripe.net TXT 192.87.45.0 I've only one comment (I think): for large ASes there will be a lot of text stored for a single label. If you should try using DNS/UDP to query for TXT for this label, default maximum DNS response packet size (512 bytes?) will likely overflow. If the resolver library in use followed the Host Requirements it should notice a truncated response, and retry with TCP, but who has a resolver library which correctly implements this? I'm not sure the resolver library in BIND does this right... Witness the attached output of "dig" and note the "tc" flag. You could use A records instead, I guess, and save some space in the DNS response packets, but this just postpons the problem a short while. I see you already did that (see below), but I still get a truncated response to the as224.aut-num.ripe.net query, so there you go... However, if all you are interested in doing is zone transfers, then TCP is already in use anyway, so maybe this is not of such a great concern. I should however point out that storing massive amounts of information on a single label is fairly "unconventional use" of the DNS (?), which may stress-test some pieces of code in new ways... I'm not sure of what a solution to this problem should be, however, or whether we just ignore the problem. - Havard -------------- next part -------------- skarv% dig @mature.ripe.net. as224.aut-num.ripe.net. any ; <<>> DiG 2.0 <<>> @mature.ripe.net. as224.aut-num.ripe.net. any ;; truncated answer ;; response truncated ;; ->>HEADER<<- opcode: QUERY , status: NOERROR, id: 11 ;; flags: qr aa tc rd ra ; Ques: 1, Ans: 58, Auth: 0, Addit: 0 ;; QUESTIONS: ;; as224.aut-num.ripe.net, type = ANY, class = IN ;; ANSWERS: as224.aut-num.ripe.net. 14400 NS mature.ripe.net. as224.aut-num.ripe.net. 14400 SOA mature.ripe.net. hostmaster.ripe.net. ( 93051001 ;serial 14400 ;refresh 1800 ;retry 14400 ;expire 14400 ) ;minim as224.aut-num.ripe.net. 14400 A 32.0.0.0 as224.aut-num.ripe.net. 14400 A 128.39.0.0 as224.aut-num.ripe.net. 14400 A 129.177.0.0 as224.aut-num.ripe.net. 14400 A 129.240.0.0 as224.aut-num.ripe.net. 14400 A 129.241.0.0 as224.aut-num.ripe.net. 14400 A 129.242.0.0 as224.aut-num.ripe.net. 14400 A 132.150.0.0 as224.aut-num.ripe.net. 14400 A 134.47.0.0 as224.aut-num.ripe.net. 14400 A 136.164.0.0 as224.aut-num.ripe.net. 14400 A 139.105.0.0 as224.aut-num.ripe.net. 14400 A 139.111.0.0 as224.aut-num.ripe.net. 14400 A 139.120.0.0 as224.aut-num.ripe.net. 14400 A 144.164.0.0 as224.aut-num.ripe.net. 14400 A 146.172.0.0 as224.aut-num.ripe.net. 14400 A 152.94.0.0 as224.aut-num.ripe.net. 14400 A 155.73.0.0 as224.aut-num.ripe.net. 14400 A 156.116.0.0 as224.aut-num.ripe.net. 14400 A 157.249.0.0 as224.aut-num.ripe.net. 14400 A 158.36.0.0 as224.aut-num.ripe.net. 14400 A 158.37.0.0 as224.aut-num.ripe.net. 14400 A 158.38.0.0 as224.aut-num.ripe.net. 14400 A 158.39.0.0 as224.aut-num.ripe.net. 14400 A 161.4.0.0 as224.aut-num.ripe.net. 14400 A 192.5.46.0 ;; Sent 2 pkts, answer found in time: 305 msec ;; FROM: skarv to SERVER: mature.ripe.net. 192.87.45.6 ;; WHEN: Mon May 10 23:32:43 1993 ;; MSG SIZE sent: 40 rcvd: 1012 skarv% From Tony.Bates at ripe.net Tue May 11 10:32:13 1993 From: Tony.Bates at ripe.net (Tony Bates) Date: Tue, 11 May 93 10:32:13 +0200 Subject: AS information available via DNS In-Reply-To: Your message of Mon, 10 May 93 23:45:52 +0200. <9305102145.AA05671@spurv> Message-ID: <9305110832.AA08673@ncc.ripe.net> Havard Eidnes writes: * ------- =_aaaaaaaaaa0 * Content-Type: text/plain; charset="us-ascii" * * > As one of the actions from the last RIPE meeting we have been thinking * > about a nice way to have an automatic update procedure based on DNS. As a * > trial for this an auto-script has been been produced that loads current * > AS derived data into zonefiles under the domain aut-num.ripe.net. This * > has two very nice features straight away. It allows you to see a list of * > networks associated with an AS. For example... * > * > [mature-tony-1480] host -lt txt as1104.aut-num.ripe.net * > AS1104.aut-num.ripe.net TXT 192.16.185.0 * > AS1104.aut-num.ripe.net TXT 192.16.186.0 * > AS1104.aut-num.ripe.net TXT 192.16.194.0 * > AS1104.aut-num.ripe.net TXT 192.16.195.0 * > AS1104.aut-num.ripe.net TXT 192.16.199.0 * > AS1104.aut-num.ripe.net TXT 192.87.45.0 * * I've only one comment (I think): for large ASes there will be a lot of text * stored for a single label. If you should try using DNS/UDP to query for * TXT for this label, default maximum DNS response packet size (512 bytes?) * will likely overflow. If the resolver library in use followed the Host * Requirements it should notice a truncated response, and retry with TCP, but * who has a resolver library which correctly implements this? I'm not sure * the resolver library in BIND does this right... Witness the attached * output of "dig" and note the "tc" flag. You could use A records instead, I * guess, and save some space in the DNS response packets, but this just * postpons the problem a short while. I see you already did that (see * below), but I still get a truncated response to the as224.aut-num.ripe.net * query, so there you go... * Sure - this we knew about but not sure how else to do it. My feeling is that most people well probably do zone transfers of the data anyway. Some of us do have good resolvers as well but I agree this is not a very good answer. One thing I did on the suggestion of Peter Koch was change the entries to A RRs. A RRs use less RDATA than TXT as you say but it doesn't help much. * However, if all you are interested in doing is zone transfers, then TCP is * already in use anyway, so maybe this is not of such a great concern. I * should however point out that storing massive amounts of information on a * single label is fairly "unconventional use" of the DNS (?), which may * stress-test some pieces of code in new ways... * Yes - this is interesting. Currently it is not too bad although it takes a little while (order of seconds) to load the data from scrath however as you saw from the RIPE meeting we only have about 25% AS coverage so far. * I'm not sure of what a solution to this problem should be, however, or * whether we just ignore the problem. * That was my feeling too. If people like the idea and we can reliably use it for the update procedure then I'll just make sure we either make "warning" documentation to use TCP based queries or we put up a good resolver. * * - Havard * Thanks for your comments, --Tony From Havard.Eidnes at runit.sintef.no Wed May 12 13:03:39 1993 From: Havard.Eidnes at runit.sintef.no (Havard Eidnes) Date: Wed, 12 May 1993 13:03:39 +0200 Subject: AS information available via DNS In-Reply-To: Your message of "Tue, 11 May 1993 10:32:13 +0200." <9305110832.AA08673@ncc.ripe.net> Message-ID: <9305121103.AA15407@spurv> > * > [mature-tony-1480] host -lt txt as1104.aut-num.ripe.net > * > AS1104.aut-num.ripe.net TXT 192.16.185.0 > * > AS1104.aut-num.ripe.net TXT 192.16.186.0 > * > AS1104.aut-num.ripe.net TXT 192.16.194.0 > * > AS1104.aut-num.ripe.net TXT 192.16.195.0 > * > AS1104.aut-num.ripe.net TXT 192.16.199.0 > * > AS1104.aut-num.ripe.net TXT 192.87.45.0 > * ... > * I'm not sure of what a solution to this problem should be, however, or > * whether we just ignore the problem. > > That was my feeling too. If people like the idea and we can reliably use > it for the update procedure then I'll just make sure we either make > "warning" documentation to use TCP based queries or we put up a good > resolver. I've given this some further thought, and a possibility could be to do it like this: $origin as224.aut-num.ripe.net. @ IN SOA ... ; @ NS ... @ NS ... ; 1 A 32.0.0.0 2 A 128.39.0.0 3 A 129.177.0.0 4 A 129.240.0.0 ; etc. Since you are primarily concerned with the value parts of the RRs in the zone, the labels you use to identify each individual entry is of lesser concern. This avoids the problem of truncated UDP response packets, but also removes the possibility to retrieve the network list by using a single DNS query (over TCP). Instead, one have to use a zone transfer to accomplish the same task. I'm not sure this is a desireable solution... I think the technically more correct thing would be to deploy/distribute (contribute to BIND) a better resolver library but it will take a while for it to be widely distributed (eg. via vendors). - Havard From Tony.Bates at ripe.net Wed May 12 15:02:40 1993 From: Tony.Bates at ripe.net (Tony Bates) Date: Wed, 12 May 93 15:02:40 +0200 Subject: AS information available via DNS In-Reply-To: Your message of Wed, 12 May 93 13:03:39 +0200. <9305121103.AA15407@spurv> Message-ID: <9305121302.AA12732@ncc.ripe.net> Havard Eidnes writes: * > * > [mature-tony-1480] host -lt txt as1104.aut-num.ripe.net * > * > AS1104.aut-num.ripe.net TXT 192.16.185.0 * > * > AS1104.aut-num.ripe.net TXT 192.16.186.0 * > * > AS1104.aut-num.ripe.net TXT 192.16.194.0 * > * > AS1104.aut-num.ripe.net TXT 192.16.195.0 * > * > AS1104.aut-num.ripe.net TXT 192.16.199.0 * > * > AS1104.aut-num.ripe.net TXT 192.87.45.0 * > * ... * > * I'm not sure of what a solution to this problem should be, however, o * r * > * whether we just ignore the problem. * > * > That was my feeling too. If people like the idea and we can reliably use * > it for the update procedure then I'll just make sure we either make * > "warning" documentation to use TCP based queries or we put up a good * > resolver. * * I've given this some further thought, and a possibility could be to do it * like this: * * $origin as224.aut-num.ripe.net. * @ IN SOA ... * ; * @ NS ... * @ NS ... * ; * 1 A 32.0.0.0 * 2 A 128.39.0.0 * 3 A 129.177.0.0 * 4 A 129.240.0.0 * ; * * etc. * Hmm... Don't like this too much either sorry. I agree about the labels are immaterial but doesn't really get round the main thing which in my opinion is listing the nets. * Since you are primarily concerned with the value parts of the RRs in the * zone, the labels you use to identify each individual entry is of lesser * concern. This avoids the problem of truncated UDP response packets, but * also removes the possibility to retrieve the network list by using a single * DNS query (over TCP). Instead, one have to use a zone transfer to * accomplish the same task. * * I'm not sure this is a desireable solution... I think the technically more * correct thing would be to deploy/distribute (contribute to BIND) a better * resolver library but it will take a while for it to be widely distributed * (eg. via vendors). * I agree. Anyone know if this will happen in 4.9 or not ? On this whole subject. It appers that from the repsonses I've had the general feeling is not to do the update procedure this way. We will use the standard "centralised" type mechanism based on logins and guarded files and not persure this any further. However as part of this whole idea I plan to leave the ability to list all the nets from the DNS so will generate network lists based on AS so at least the functionality is there for those who want to make use of it. --Tony. From Erik-Jan.Bos at SURFnet.nl Tue May 18 22:06:37 1993 From: Erik-Jan.Bos at SURFnet.nl (Erik-Jan.Bos at SURFnet.nl) Date: Tue, 18 May 93 22:06:37 +0200 Subject: BIND 4.9 Message-ID: <9305182006.AA04496@surgeon.surfnet.nl> DNSsers, I think most of you saw the Paul Vixie announcement of BIND version 4.9. I ftp-ed the .tar.Z file and it all looks very neat, IMHO. Some documentation and tools are also present in the .tar.Z file! Compiling the stuff on SunOS 4.1.3 is without any problems. But I think I have a problem running the 4.9 named. After I type "/usr/etc/in.named", I get the message: ld.so: libc.so.8: not found Weird, I would say, since the file "/usr/lib/libc.so.8" is present on the system I try it on (and, yes, I also did a "ldconfig" after placing the file in /usr/lib). Does somebody have a clue for me? Thanks for your concern. __ Erik-Jan. P.S. In case you missed the Paul Vixie annoucement you can anonymous FTP it from "ftp.nic.surfnet.nl" in the directory "surfnet/net-management/ip/docs" as "bind-4.9.me". From Francis.Dupont at inria.fr Wed May 19 10:22:04 1993 From: Francis.Dupont at inria.fr (Francis Dupont) Date: Wed, 19 May 1993 10:22:04 +0200 Subject: BIND 4.9 has been released Message-ID: <199305190822.AA03947@givry.inria.fr> Seen in the news in comp.protocols.tcp-ip.domains: From: vixie at pa.dec.com (Paul A Vixie) Subject: BIND 4.9 has been released Date: 17 May 93 19:42:21 GMT Organization: DEC Network Systems Lab Lines: 40 NNTP-Posting-Host: cognition.pa.dec.com [ this was posted on the bind and namedroppers mailing lists, now here. --vix ] After several years of development and at least one year of testing, BIND 4.9 has finally exited Beta testing and is ready to rock and roll. You can get it from gatekeeper.dec.com via anonymous FTP as /pub/BSD/bind/4.9/4.9.930517.tar.Z (the Bind Operations Guide, substantially improved, is in the same directory, called BOG.psf). This BIND has been the name server running on DECWRL.DEC.COM, UUNET.UU.NET, EUNET.EU.NET, MUNNARI.OZ.AU, and hundreds of other large and small servers, for at least six months. We consider it "stable". Improvements over 4.8.3 are too numerous to list. If you have had any kind of trouble with 4.8.3 (and if you use it, you've had trouble with it, though you may not know this), you should upgrade to 4.9. Operating system vendors are encouraged to include this version of BIND as soon as their release schedules permit; the NSFnet backbone will thank you for it, as will your customers. This BIND includes "dig" (from USC/ISI) and "host" (from Rutgers), as well as a large collection of contributed scripts, utilities, and documentation. The resolver has also been improved. This BIND is known to compile and run on ULTRIX/RISC 4.2-4.3, SunOS 4.1.x, BSD/386 1.0, NeXTstep 3.0, UMIPS/V, HP-UX 8.x, Alpha AXP OSF/1 1.2, and more. This BIND was funded by Digital Equipment Corporation and is hereby released into full public use, subject to the same restrictions as the U C Berkeley Networking 2 ("net2") release. There is a DIGITAL ("DEC") Copyright in each file but it's just noise for the lawyers -- no practical restrictions have been added other than DIGITAL's disclaimer of liability. I (Paul Vixie) was the principle contributor to this release, as well as code librarian and test/release coordinator. However, my efforts would have been wasted without the assistance and participation of the alpha test list, to whom special thanks are given in the new Bind Operations Guide ("BOG"). -- Paul Vixie, DEC Network Systems Lab Palo Alto, California, USA "Don't be a rebel, or a conformist; decwrl!vixie they're the same thing, anyway. Find vixie!paul your own path, and stay on it." -me PS (from Francis Dupont): A copy of it and diffs for NSAP support are available in: nic.switch.ch:/software/sources/network/bind/bind.4.9.930517.tar.Z nic.switch.ch:/software/sources/network/bind/bind.4.9-nsap-diffs From ncc at ripe.net Wed May 19 10:27:22 1993 From: ncc at ripe.net (RIPE NCC Staff) Date: Wed, 19 May 1993 10:27:22 +0200 Subject: BIND 4.9 has been released Message-ID: <9305190827.AA04834@ncc.ripe.net> [Of course you can also find bind 4.9 and the Operations guide on ftp.ripe.net:tools/dns -- Marten] ------- Forwarded Message Seen in the news in comp.protocols.tcp-ip.domains: From: vixie at pa.dec.com (Paul A Vixie) Subject: BIND 4.9 has been released Date: 17 May 93 19:42:21 GMT Organization: DEC Network Systems Lab Lines: 40 NNTP-Posting-Host: cognition.pa.dec.com [ this was posted on the bind and namedroppers mailing lists, now here. --vix ] After several years of development and at least one year of testing, BIND 4.9 has finally exited Beta testing and is ready to rock and roll. You can get it from gatekeeper.dec.com via anonymous FTP as /pub/BSD/bind/4.9/4.9.930517.tar.Z (the Bind Operations Guide, substantially improved, is in the same directory, called BOG.psf). This BIND has been the name server running on DECWRL.DEC.COM, UUNET.UU.NET, EUNET.EU.NET, MUNNARI.OZ.AU, and hundreds of other large and small servers, for at least six months. We consider it "stable". Improvements over 4.8.3 are too numerous to list. If you have had any kind of trouble with 4.8.3 (and if you use it, you've had trouble with it, though you may not know this), you should upgrade to 4.9. Operating system vendors are encouraged to include this version of BIND as soon as their release schedules permit; the NSFnet backbone will thank you for it, as will your customers. This BIND includes "dig" (from USC/ISI) and "host" (from Rutgers), as well as a large collection of contributed scripts, utilities, and documentation. The resolver has also been improved. This BIND is known to compile and run on ULTRIX/RISC 4.2-4.3, SunOS 4.1.x, BSD/386 1.0, NeXTstep 3.0, UMIPS/V, HP-UX 8.x, Alpha AXP OSF/1 1.2, and more. This BIND was funded by Digital Equipment Corporation and is hereby released into full public use, subject to the same restrictions as the U C Berkeley Networking 2 ("net2") release. There is a DIGITAL ("DEC") Copyright in each file but it's just noise for the lawyers -- no practical restrictions have been added other than DIGITAL's disclaimer of liability. I (Paul Vixie) was the principle contributor to this release, as well as code librarian and test/release coordinator. However, my efforts would have been wasted without the assistance and participation of the alpha test list, to whom special thanks are given in the new Bind Operations Guide ("BOG"). - -- Paul Vixie, DEC Network Systems Lab Palo Alto, California, USA "Don't be a rebel, or a conformist; decwrl!vixie they're the same thing, anyway. Find vixie!paul your own path, and stay on it." -me PS (from Francis Dupont): A copy of it and diffs for NSAP support are available in: nic.switch.ch:/software/sources/network/bind/bind.4.9.930517.tar.Z nic.switch.ch:/software/sources/network/bind/bind.4.9-nsap-diffs ------- End of Forwarded Message From Marten.Terpstra at ripe.net Wed May 19 11:18:22 1993 From: Marten.Terpstra at ripe.net (Marten Terpstra) Date: Wed, 19 May 1993 11:18:22 +0200 Subject: BIND 4.9 In-Reply-To: Your message of Tue, 18 May 1993 22:06:37 +0200. <9305182006.AA04496@surgeon.surfnet.nl> Message-ID: <9305190918.AA05115@ncc.ripe.net> Erik-Jan.Bos at SURFnet.nl writes: * DNSsers, * * I think most of you saw the Paul Vixie announcement of BIND version 4.9. * I ftp-ed the .tar.Z file and it all looks very neat, IMHO. Some * documentation and tools are also present in the .tar.Z file! Yes, including the latest version of "host". * Compiling the stuff on SunOS 4.1.3 is without any problems. But I think * I have a problem running the 4.9 named. * * After I type "/usr/etc/in.named", I get the message: * * ld.so: libc.so.8: not found * * Weird, I would say, since the file "/usr/lib/libc.so.8" is present on the * system I try it on (and, yes, I also did a "ldconfig" after placing the * file in /usr/lib). * * Does somebody have a clue for me? Thanks for your concern. Just compiled the thing, and no problems seen so far. Everything seems to work just fine. Check what is in file /etc/ld.so.cache (using strings , to see if it knows libc.so.8. Maybe even you should throw away that cache file, and run ldconfig as in your rc.* files. Also, libc.so.8 is quite a high number if you ask me, rebuild the libc a lot ? We're just on 1.7.1. Then again, we run SunOS 4.1.2, but there's hardly any differences between the two ... -Marten From Erik-Jan.Bos at SURFnet.nl Wed May 19 14:05:52 1993 From: Erik-Jan.Bos at SURFnet.nl (Erik-Jan.Bos at SURFnet.nl) Date: Wed, 19 May 93 14:05:52 +0200 Subject: BIND 4.9 In-Reply-To: Your message of Wed, 19 May 93 11:18:22 +0200. Message-ID: <9305191205.AA06177@surgeon.surfnet.nl> Marten, > * Compiling the stuff on SunOS 4.1.3 is without any problems. But I think > * I have a problem running the 4.9 named. > * > * After I type "/usr/etc/in.named", I get the message: > * > * ld.so: libc.so.8: not found > * > * Weird, I would say, since the file "/usr/lib/libc.so.8" is present on the > * system I try it on (and, yes, I also did a "ldconfig" after placing the > * file in /usr/lib). > * > * Does somebody have a clue for me? Thanks for your concern. > > Just compiled the thing, and no problems seen so far. Everything seems to > work just fine. Check what is in file /etc/ld.so.cache (using strings , to > see if it knows libc.so.8. Maybe even you should throw away that cache file, > and run ldconfig as in your rc.* files. Also, libc.so.8 is quite a high number > if you ask me, rebuild the libc a lot ? We're just on 1.7.1. Then again, we > run SunOS 4.1.2, but there's hardly any differences between the two ... I threw away libc.so.8 and rebuilt libc.so (I know have a version number 1.8.4 locally). Everything is working fine now (and ns.surfnet.nl is running 4.9 BIND). Thanks for pointing me into the libc.so itself direction. __ Erik-Jan.