what is wrong with DNS name 'covid19booster.healthservice.ie' ? : Google : what is Google's secret DNS service ?

Jason Vas Dias jason.vas.dias at gmail.com
Sun Jan 9 11:57:41 UTC 2022


Thanks Fred -

  Though really all I am trying to do is ensure I can access
  all public DNS names, which my experience shows me I
  cannot, using my ISP's name-servers.

  It seems there is a Hidden Google Internet that I cannot access
  unless I use Google's DNS servers, giving Google data
  about me to sell - this is what I am trying to avoid .

RE:
> Can't you do the auth lookups directly? Have you tried?

   You mean add topsectechnology.net's DNS servers to
   my Forwarders list ?

   How do I find out what they are, when the domain
   cannot be looked up by ICANN's WHOIS service ?

   And really this would not be a solution, every time I get an
   NXDOMAIN error, I'd  have to access multiple web-sites
   to find the authoritative nameserver for the domain
   (which fails for topsectechnology.net anyway), and
   then add them to my Forwarders list ?

   Is this the way the DNS is meant to work these days ?

   I thought the DNS was meant to be public and global.

   I see that nowadays it is not . What a shame !
   How did we let this happen ?

   And this is meant to be a vital public information service !
   Why choose to hide the domain name that allows the public
   to make a Covid Booster booking, unless the intent is
   to exclude a section of society from accessing it ?

 > the BIND mailing list is were I should direct my ire.

    Isn't this the BIND mailing list we are discussing this on?
    Is there another one I should be using ? If so, please let
    me know .

> Any response you get here is going to involve changing your
> BIND server's configuration and behavior, probably to convert
>  it from forwarding to  caching...

   Fine !  I am just using a slightly modified Red Hat
   caching nameserver example named.conf, enclosed .

   Why isn't this a caching nameserver ?

   If anyone could suggest how to turn my config into one
   that is able to query the Google Hidden Internet, without
   accessing a Google Server, please let me know.

Thanks & Best Regards,
Jason

On 08/01/2022, Fred Morris <m3047 at m3047.net> wrote:
> Wow.
>
> 1) You're using BIND as a caching nameserver.
>
> So you say. Does the nameserver do its own upstream (authoritative)
> lookups? If yes, then the term of art is "recursive / caching"; otherwise
> the term is "forwarding".
>
> Looks like you're configuring your ISP's nameservers as forwarders.
> Therefore the proper term is "forwarding".
>
> 2) Your ISP's nameservers fail to resolve $FQDN.
>
> These are other people's caching nameservers.
>
> 3) Google's nameservers resolve $FQDN.
>
> These are other people's caching nameservers.
>
> 4) Looks like the nameservers for healthservice.ie belong to
> topsectechnology.net.
>
> 5) Looks like those nameservers resolve $FQDN.
>
> At least that's what dig +trace tells me.
>
>
> Can't you do the auth lookups directly? Have you tried?
>
>
> So your logic in coming here is that:
>
> a) $A's caching nameservers don't resolve $FQDN.
>
> b) $B's caching nameservers do resolve $FQDN.
>
> c) You use BIND to connect to one of those entities' caching nameservers
> instead of running your own.
>
> d) Therefore, the BIND mailing list is were I should direct my ire.
>
> Did I miss anything?
>
>
> Any response you get here is going to involve changing your BIND server's
> configuration and behavior, probably to convert it from forwarding to
> caching... although grizzled veterans may tell you horror stories about
> hotels and other public wifi.
>
> --
>
> Fred Morris
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to
> unsubscribe from this list
>
> ISC funds the development of this software with paid support subscriptions.
> Contact us at https://www.isc.org/contact/ for more information.
>
>
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
>
-------------- next part --------------
//
// named.caching-nameserver.conf
//
// Provided by Red Hat caching-nameserver package to configure the
// ISC BIND named(8) DNS server as a caching only nameserver 
// (as a localhost DNS resolver only). 
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
// DO NOT EDIT THIS FILE - use system-config-bind or an editor
// to create named.conf - edits to this file will be lost on 
// caching-nameserver package upgrade.
//
options {
	listen-on port 53 { 127.0.0.1; 192.168.122.1; 192.168.4.1; 192.168.42.10; };
	listen-on-v6 port 53 { ::1; };
	directory 	"/var/named";
	dump-file 	"/var/named/data/cache_dump.db";
        statistics-file "/var/named/data/named_stats.txt";
        memstatistics-file "/var/named/data/named_mem_stats.txt";
	secroots-file	"/var/named/data/named.secroots";
	recursing-file	"/var/named/data/named.recursing";
	dnssec-enable no;
	dnssec-validation no;

	resolver-query-timeout 64;
	resolver-retry-interval 8;
	max-retry-time 64;

	managed-keys-directory "/var/named/dynamic";
	geoip-directory "/usr/share/GeoIP";

	pid-file "/run/named/named.pid";
	session-keyfile "/run/named/session.key";

	/* https://fedoraproject.org/wiki/Changes/CryptoPolicy */
	include "/etc/crypto-policies/back-ends/bind.config";

	//query-source    port 53;	
	//query-source-v6 port 53;
	allow-query     { localhost; 192.168.122.0/24; 192.168.4.0/24; 192.168.42.0/24; };
};

include "/etc/named.root.key";

logging {
        channel default_debug {
                file "data/named.run";
                severity dynamic;
        };
};

view localhost_resolver {
	match-clients 	   { localhost; 192.168.122.0/24; 192.168.4.0/24; 192.168.42.0/24; };
	match-destinations { localhost; 192.168.122.0/24; 192.168.4.0/24; 192.168.42.0/24; };

	zone "." IN {
	     type hint;
	     file "named.ca";
	};
	
        zone "jvdspc" {  // my fake TLD localhost nickname
             type    master;
             file    "jvdspc.zone";
        };

	include "/etc/named.rfc1912.zones";

	zone "jvds.net" { // my local "domain"
             type    master;
             file    "jvds.net.zone";
        };
	
        zone "1.168.192.in-addr.arpa" { // my local "domain"
             type    master;
             file    "1.168.192.zone";
        };
	
	zone "jvdsph.net" { // my local "domain"
             type    master;
             file    "jvdsph.net.zone";
        };
	
        zone "4.168.192.in-addr.arpa" { // my local "domain"
             type    master;
             file    "4.168.192.zone";
        };
        zone "jvdsvm.net" { // my local "domain"
             type    master;
             file    "jvdsvm.zone";
        };
	
        zone "122.168.192.in-addr.arpa" { // my local VMs "domain"
             type    master;
             file    "122.168.192.zone";
        };
	
        response-policy    { zone "nasty"; };
	zone "nasty" {    // blacklist from http://someonewhocares.org, converted to RPZ zone!
             type    master;
             file    "internet.nasty.zone";
             allow-query {none;}; 
        };

        forwarders {	       
//	       172.16.15.254;
//	       212.36.35.18; 212.36.35.17;	       
               159.134.0.11; 159.134.0.12; // 192.168.1.1; 8.8.8.8;	       
//	       192.168.5.1;
//	       192.168.1.1;
//	       192.168.117.22; // Ludgate LAN
// 	       192.168.12.22;// Ludgate WiFi
//             192.168.0.254; // Pa's
//               192.168.43.1; // my default router (phone)	
     	};

	recursion  yes;				
};





































More information about the bind-users mailing list