Dynamic DNS (was Re: h2n 2.38)
Jim Reid
jim at rfc1035.com
Fri Jun 15 13:44:22 UTC 2001
>>>>> "Brad" == Brad Knowles <brad.knowles at skynet.be> writes:
>> I disagree. Unless DDNS is used sensibly, it can cause far
>> bigger problems than it supposedly solves. Lack of proper audit
>> trails, weak change controls, scaling, security, and
>> inconsistent zone integrity (eg CNAME and other data errors)
>> are just some of the problems that can arise from ill-judged
>> use of DDNS.
Brad> And what about locking? Normally, when we talk about
Brad> a database system that might have multiple different clients
Brad> accessing it and updating it simultaneously, we talk about
Brad> things like ACID (atomicity, consistency, isolation,
Brad> durability), and whether a particular database includes
Brad> record locking, two-phase commit, rollback, etc.... I don't
Brad> see any of these kinds of features being available
Brad> internally to BIND.
That's because they are not really needed to implement DDNS. Either a
dynamic update succeeds or it fails. The issue of synchronisation
shouldn't arise either. A zone has only one master server and all the
update requests for it have to be processed there. That server can
serialise those incoming requests: for instance by ensuring only one
DDNS request is in progress for a zone at any given moment. So in
essense each DDNS request can be considered an atomic transaction --
"add/remove/change these RRs provided these other RRs exist (or don't
exist)" -- with a clearly defined outcome.
More information about the bind-users
mailing list