Replies: 8 comments 15 replies
-
If this can help, this specific use case is described in depth in rfc2317 (Classless IN-ADDR.ARPA delegation) In our institution we are using longer prefixes (>/24) delegated to DNS servers still managed internally (not to outside customer). It serves the purpose to assign address to different zones in the dyndns registration. It is not much common but still used in IPv4. With Ipv6 we will not be using anything longer than /64 |
Beta Was this translation helpful? Give feedback.
-
Hi @wolfspyre, do you think that should be such a zone as The definition of overlapping zones can easily be caught on data entry, and given the fact that allowing overlaps results in tons of confusion while not making any sense I would definitely tend to disallow such a configuration. Regarding views, they definitely isolate zone sets from each other - an A/AAAA record in a given view will only create PTR records within the same view, so overlapping definitions between views do not matter at all. Or am I missing something? |
Beta Was this translation helpful? Give feedback.
-
okay lemme try this again.... So.... I have the entire I declare a reverse zonefile in view "INTERNALZONES"
I allocate the I allocate the subnet the reverse zonefiles aught be: I would like to be able to inform netbox-dns somehow that the the three /16 subnet zones are children of the /8... ( because the in the above cases, I'm talking about LARGER subnets than a /24.
which would reference the so any record added to the aught be present in the ( as well as the default /24 zonefile: as they are each distinctly referencing the same addresses (just with different bounds) does that make sense? |
Beta Was this translation helpful? Give feedback.
-
Just a quick heads-up: I started implementing RFC2317 today. As always, don't hold your breath - it will take some more days or weeks until something presentable is available. What's currently working:
While not looking too impressive that should be a good basis to go on from. The next steps will be:
So as I said - don't hold your breath (yet). The good thing is that I now have a pretty clear idea how the solution will look eventually. |
Beta Was this translation helpful? Give feedback.
-
Another heads-up: I'm currently experimenting with arbitrarily named zones containing RFC2317 PTR records and how this can be achieved with NetBox DNS. It's a bit longer shot, but it would remove some limitations - on the other hand it might add additional complexity, and this stuff is not really simple to handle to start with. When we want to enable domains with arbitrary names, we need to add some way to identify PTR records to be pointed to by the CNAME records in the regular .in-addr.arpa-Zones. While this is rather attractive in a way, it's also a bit more confusing. The next step would then be to make the naming convention for the PTR records flexible as well, so for instance we'd get, for instance,
and
as the resolution path for a PTR in an RFC2317-delegated zone. I'm not sure it is worth the considerable effort to implement, document and maintain this flexible approach - any thoughts on this? |
Beta Was this translation helpful? Give feedback.
-
teehee :)
does this differ, api-response-wise from a forward zone netbox dns is unaware of? should it? (no immediate strong thoughts here either way, but did seem like an interesting question philosophically)
yeah, i can see that too… so let’s say we’ve created that /25 and we’ve created a sub-zone for hosts in it. ‘dhcp.example.com’ we declare both the forward and reverse zones as resources managed by nameservers netbox dns is aware of…. (case 1) we run a script to emit the views and records per zone from netbox dns’ perspective what assessment/validation logic would make sense in both directions? (fwd/reverse) what about case 1B where parent zone 2.0.192.in-addr.arpa is owned by org A Team A1 in netbox rfc2317 zone 0/25.2.0.192.in-addr.arpa is delegated to OrgA Team A5 in netbox rfc2317 zone 128/25.2.0.192.in-addr.arpa is delegated to OrgB Team B4 in netbox the forward zone a5kicksbutt.com belongs to orgA team A5 B4isbetter.com belongs to org B team B4 the user AA1mojo has privilege to CRUD all OrgA resources. the user AA1minion has privilege to CRUD resources which belong to team a1 and R access to all orgA resources. the user AA5ops has R privilege to all OrgA resources. and has CRUD access to all team A5 resources. The user happyB4 has CRUD privilege for all Org B resources what resources should the AA5ops user be unable to alter? what resource privileges should be different between the AA5ops and AA1minion users? What should the user happyB4 be unable to alter? IDK that we want to go so far as gating privilege by default, but it feels like there are a few isolation boundary validation cases that can be programmatically verified |
Beta Was this translation helpful? Give feedback.
-
Offline RFC2317 zones are important as they tell NetBox DNS not to create PTR records in the parent zone, but CNAMEs, and what name servers the zone should be delegated to. That is quite exactly the same that's done for active RFC2317 zones, they are just there to simplify the logic for record handling.
Possibly a valid use case, but definitely the next can of worms. And one that I'd like to keep closed for the time being, as permissions on object level are an entirely different and much more complex cup of tea. Not sure how well it is handled in Django, much less in NetBox. I'd rather wait for someone who actually has that use case and needs support for it than open that can proactively, or this feature will never see the light. |
Beta Was this translation helpful? Give feedback.
-
I had a discussion with a friend yesterday, and he made me aware of a special case for PTR record management. I thought I'd ask around whether there is broad demand for this before thinking of a solution (but unfortunately couldn't help doing so anyway before I asked, so I'll share my ideas as well).
The situation is that there are many people and companies who do not have a complete byte-boundary (IPv4) or nibble-boundary (IPv6) subnet delegated to them. I guess the IPv6 problem is much less common, but it is possible that there are actually address assignments of /63 or similar atrocities in the IPv6 world as well - Providers surprise me again and again.
So let'a assume you don't have a full /24 IPv4 subnet assigned to you, and so classic reverse zone delegation does not work - you don't get the in-addr.arpa zone assigned to you, so the current implementation of PTR auto generation within NetBox DNS won't work.
The solution his provider uses for this is quite simple: They assign a non-standard reverse zone to their customers, and then they create CNAMEs to specific records in that zone in the actual in-addr.arpa zone. So the customer manages the PTR records in some other zone (let's call it
16.168.192.ptr.example.com
for the sake of this example, but the name is arbitrary), and then CNAME records in the actual reverse zone on the provider's name servers point to entries within that zone, e.g.17.168.192.in-addr.arpa
is a CNAME for17.16.168.192.ptr.example.com
(no worries, I will not post an IPv6 example :-)).So the question is: How can we provide automatic PTR generation in such a case? And what variants of that schema are floating around? Is that a frequent use case at all, or is it something that is only relevant as an edge case? Honestly I have no idea.
A possible solution within NetBox DNS would be a special type of zone that is flagged as a reverse zone for a given prefix, although it is not one in the classical sense. The information that would be needed is:
17
for17.16.168.192.ptr.example.com.
but maybe there are other formats in use as well?Currently, the only solution is to create the PTR records manually, but that's not really satisfying. Should this be something to look into more deeply, or is it such an edge case within the group of possible uses that it does not have high priority?
Beta Was this translation helpful? Give feedback.
All reactions