Re: [DNSOP] howto "internal"

Grant Taylor <> Tue, 24 July 2018 18:31 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 3CB481311A5 for <>; Tue, 24 Jul 2018 11:31:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 9E8FpysnY_TD for <>; Tue, 24 Jul 2018 11:31:18 -0700 (PDT)
Received: from ( [IPv6:2600:3c00::f03c:91ff:fe26:8849]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 2D4D71311A6 for <>; Tue, 24 Jul 2018 11:31:18 -0700 (PDT)
Received: from REDACTED ( [IPv6:2620:0:102a:11:fe50:e322:5780:92c6]) (authenticated bits=0) by (8.15.2/8.15.2/Debian-3) with ESMTPSA id w6OIVGpX020981 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <>; Tue, 24 Jul 2018 13:31:17 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;; s=2015; t=1532457077; bh=Q8LA6Kgd7RKyTdJzms4duSdbN3KJoRThljM8LMRrt80=; h=Subject:To:References:From:Message-ID:Date:User-Agent: MIME-Version:In-Reply-To:Content-Type:Cc:Content-Disposition: Content-Language:Content-Transfer-Encoding:Content-Type:Date:From: In-Reply-To:Message-ID:MIME-Version:References:Reply-To: Resent-Date:Resent-From:Resent-To:Resent-Cc:Sender:Subject:To: User-Agent; b=22Afg/CqO1VIKTxDPKvwBgnV7cVlrWT7VqrtN0JdaQdGH7+MOY9C8U1ehap28FV3O MporcnQJNBqxAEHx5e11kQ2I39PXr5X7HBkbjMKDjrFHFTfS8WqPut0iWMjPVdybyo UCXhTUhRW8BZRnf3afFJ2HYXzmxVJaZpA17RKMmo=
References: <> <> <> <> <>
From: Grant Taylor <>
Organization: TNet Consulting
Message-ID: <>
Date: Tue, 24 Jul 2018 12:31:16 -0600
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms050300040205040102050105"
Archived-At: <>
Subject: Re: [DNSOP] howto "internal"
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 24 Jul 2018 18:31:20 -0000


On 07/24/2018 10:10 AM, Paul Vixie wrote:
> i also use real domains for my private stuff. but i also use RPZ locally 
> for the internal bindings,

Do you leverage anything like Dynamic DNS updates in conjunction with 
DHCP?  If so, how well does that play with the configuration that you're 

> not NS RR delegations that i'd have to keep out of my externally-served 
> zone files.

Is there a best practice around this method of delegating to 
sub-domain(s) that are inaccessible to the public?

Is it better to return NODATA or NXDOMAIN to global clients querying for  Or is there a different error that can be 
returned to indicate no access?

I guess there's always delegating to a server that is inaccessible 
externally too.

Grant. . . .
unix || die