<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NEONOS .NET &#187; Amazon Web Services</title>
	<atom:link href="https://neonos.net/category/amazon-web-services/feed/" rel="self" type="application/rss+xml" />
	<link>https://neonos.net</link>
	<description>&#38; ONE DAY TECHNOLOGY WILL SET US ALL FREE</description>
	<lastBuildDate>Tue, 13 Jan 2015 20:05:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>White Labeled DNS Name Servers on Amazon Route 53 with Delegation Sets</title>
		<link>https://neonos.net/white-labeled-dns-name-servers-on-amazon-route-53-with-delegation-sets/</link>
		<comments>https://neonos.net/white-labeled-dns-name-servers-on-amazon-route-53-with-delegation-sets/#comments</comments>
		<pubDate>Sat, 06 Dec 2014 23:54:26 +0000</pubDate>
		<dc:creator><![CDATA[neo]]></dc:creator>
				<category><![CDATA[Amazon Web Services]]></category>

		<guid isPermaLink="false">http://neonos.net/?p=30</guid>
		<description><![CDATA[The functionality has been programmed by Amazon in Nov 2014, however it has not been implemented in the web based console, hopefully they will do this soon. There is also no documentation or any articles that I could find on this topic. But I was able to do this by using AWS Client, using the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The functionality has been programmed by Amazon in Nov 2014, however it has not been implemented in the web based console, hopefully they will do this soon. There is also no documentation or any articles that I could find on this topic. But I was able to do this by using AWS Client, using the command:</p>
<p><code> aws route53 create-reusable-delegation-set --caller-reference dns1</code><br />
See <a title="Creating Delegation Set on AWS Client Route 53 Command Line" href="http://docs.aws.amazon.com/Route53/latest/APIReference/api-create-reusable-delegation-set.html">http://docs.aws.amazon.com/Route53/latest/APIReference/api-create-reusable-delegation-set.html</a></p>
<p>This will give 4 reusable nameservers/delegated-set that can be reused in future created hosted zones. You will have to setup the hosted zones from command-line as well.</p>
<p>When trying to create a hosted zone using a reusable delegation set, you could specify an optional DelegationSetId, and Route53 would assign those 4 NS records for the zone, instead of allocating a new one.</p>
<hr />
<p>Now Amazon claims that this can be done to white label these nameservers without any further reference.</p>
<blockquote><p>&#8220;This feature also makes it possible for you to create “white label”<br />
name server addresses such as ns1.example.com, ns2.example.com, etc.,<br />
which you can point to your Route 53 name servers. You can then use<br />
your &#8220;white label&#8221; name server addresses as the authoritative name<br />
servers for as many of your domain names as desired.&#8221; &#8211;SeanM@AWS</p></blockquote>
<p><a title="New Route 53 White Label Name servers Feature " href="https://forums.aws.amazon.com/ann.jspa?annID=2733">https://forums.aws.amazon.com/ann.jspa?annID=2733</a></p>
<hr />
<p>The problem is that Amazon also says that they can not guarantee the IP&#8217;s of the nameservers not changing.</p>
<p><a title="Amazon Route  53 Guarantee IP Change of Nameservers" href="https://forums.aws.amazon.com/thread.jspa?messageID=474708">https://forums.aws.amazon.com/thread.jspa?messageID=474708</a></p>
<blockquote><p>&#8220;We do promise that the DNS names of your Route 53 nameservers will<br />
not change, but we can&#8217;t make the same guarantee about their IP<br />
addresses. If they were to change in the future, your DNS could<br />
silently break if you used them in this unsupported way.&#8221; &#8212; DavidR@AWS Jan 25, 2011</p></blockquote>
<p><strong>Update: </strong>Before you freak out this might help you feel better: </p>
<blockquote><p>Some registrars only allow you to specify name servers using IP<br />
addresses; they don&#8217;t allow you to specify fully qualified domain<br />
names. If your registrar requires using IP addresses, you can get the<br />
IP addresses for your name servers using the dig utility (for Mac,<br />
Unix, or Linux) or the nslookup utility (for Windows). We rarely<br />
change the IP addresses of name servers; if we need to change IP<br />
addresses, we&#8217;ll notify you in advance.</p></blockquote>
<p><a title="Route 53 IPs Hardly Ever Change" href="http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/SOA-NSrecords.html">http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/SOA-NSrecords.html</a></p>
<p>Keep in mind it is a bad idea to create CNAME records with your own domain for each of the nameservers, even though this in theory would solve the change of IP issue it is a bad idea:</p>
<blockquote><p>NS records pointing to a CNAME is bad and may conflict badly with<br />
current BIND servers. In fact, current BIND implementations will<br />
ignore such records, possibly leading to a lame delegation. There is a<br />
certain amount of security checking done in BIND to prevent spoofing<br />
DNS NS records. Also, older BIND servers reportedly will get caught in<br />
an infinite query loop trying to figure out the address for the<br />
aliased nameserver, causing a continuous stream of DNS requests to be<br />
sent. &#8211;RFC1912</p></blockquote>
<p><a title="RFC Link" href="http://www.faqs.org/rfcs/rfc1912.html">http://www.faqs.org/rfcs/rfc1912.html</a></p>
<hr />
<p>So to some it up, create your delegation set:<br />
<code>aws route53 create-reusable-delegation-set  --caller-reference MyDelegationSet</code><br />
This will return something such as:<br />
<code>{<br />
    "Location": "https://route53.amazonaws.com/2015-01-01/delegationset//delegationset/XXXXXXXXXXXX",<br />
    "DelegationSet": {<br />
        "NameServers": [<br />
            "ns-xxx.awsdns-xx.com",<br />
            "ns-xxx.awsdns-xx.co.uk",<br />
            "ns-xxx.awsdns-xx.org",<br />
            "ns-xxx.awsdns-xx.net"<br />
        ],<br />
        "CallerReference": "MyDelegationSet",<br />
        "Id": "/delegationset/XXXXXXXXXX"<br />
    }<br />
}</code><br />
Save this output, then ping each one of your name servers and create the glue records in the parent zone, using A records, I recommend shorter TTLs in case Amazon informs of IP changes to dns zones. I called mine route531.mydomain.com, route532&#8230; ect.<br />
<code>aws route53  create-hosted-zone --delegation-set-id /delegationset/XXXXXXXX --name mydomain.tld</code><br />
Now update your domain nameservers at the registrar, then update your Route53 to include those nameservers as Authoritative nameservers as well. </p>
]]></content:encoded>
			<wfw:commentRss>https://neonos.net/white-labeled-dns-name-servers-on-amazon-route-53-with-delegation-sets/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
