{"id":670,"date":"2008-05-22T11:40:55","date_gmt":"2008-05-22T16:40:55","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/hoanga\/2008\/05\/22\/unbound-a-possible-oss-competitor-to-b"},"modified":"2008-05-22T11:40:55","modified_gmt":"2008-05-22T16:40:55","slug":"unbound-a-possible-oss-competitor-to-bind","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/hoanga\/2008\/05\/22\/unbound-a-possible-oss-competitor-to-bind\/","title":{"rendered":"Unbound, a possible OSS competitor to BIND?"},"content":{"rendered":"<p>A quite from <a href=\"http:\/\/blogs.eweek.com\/cheap_hack\/content\/dns\/new_open_source_dns_server_supports_dnssec.html\">this article<\/a> I pulled up from Planet Sysadmin<\/p>\n<pre>\r\nUnbound was written by NLnet Labs, VeriSign, Nominet and Kirei. Unbound will support DNSSEC, a version of DNS that uses public-key cryptography to protect DNS results, from begriming. Unbound and BIND are the only open-source recursive DNS servers that support DNSSEC.\r\n<\/pre>\n<p>Seems interesting.  If they can make sure to make the transition from BIND as painless as possible I&#8217;m sure it will start getting some traction.   Although, if you don&#8217;t need DNSSEC and lots of fancy features djbdns handles things not so badly (in my experience).<\/p>\n<p>One thing that is interesting that wasn&#8217;t mentioned in the news announcement is that Unbound <a href=\"http:\/\/www.unbound.net\/pipermail\/unbound-users\/2008-May\/000063.html\">ONLY handles recursive requests<\/a> while its cousin nsd is an authoritative only nameserver which is similar to how the djbdns suite works.  In some cases, I DO like how BIND can handle both authoritative and recursive in one binary but I guess it always depends on the situation&#8230;<\/p>\n<p><a href=\"http:\/\/blogs.eweek.com\/cheap_hack\/content\/dns\/new_open_source_dns_server_supports_dnssec.html\">Read the announcement on eweek<\/a><br \/>\n<br \/>\n<a href=\"http:\/\/www.unbound.net\/\">Unbound&#8217;s website<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A quite from this article I pulled up from Planet Sysadmin Unbound was written by NLnet Labs, VeriSign, Nominet and Kirei. Unbound will support DNSSEC, a version of DNS that uses public-key cryptography to protect DNS results, from begriming. Unbound and BIND are the only open-source recursive DNS servers that support DNSSEC. Seems interesting. If [&hellip;]<\/p>\n","protected":false},"author":703,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1029,260],"tags":[],"class_list":["post-670","post","type-post","status-publish","format-standard","hentry","category-open-source","category-tech"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/users\/703"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/comments?post=670"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/670\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/media?parent=670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/categories?post=670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/tags?post=670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}