Random DNS Queries?

While sifting through my DNS query log, I came across these highly suspicious DNS queries:

query[A] urjhyay.local
query[A] tadzwrawzpuqdc.local
query[A] fgrxhztwffv.local
query[A] tadzwrawzpuqdc.local
query[A] urjhyay.local
query[A] fgrxhztwffv.local
query[A] qieosgbvzzhtt.local
query[A] qdjpfwezir.local
query[A] kzqwcaaq.local
query[A] qdjpfwezir.local
query[A] kzqwcaaq.local
query[A] qieosgbvzzhtt.local
query[A] prhwndine.local

While this looks like something maleware-ish, I found a plausible explaination for this weirdness, it seems to be related to the chrome browser:

Among those requests Chrome also tries to find out if someone is messing up with the DNS (i.e. “nasty”ISPs that have wildcard DNS servers to catch all domains). Chrome does this by issuing 3 DNS requests to randomly generated domain names, for every DNS extension configured.

Powerdns 4 – Update slaves after zone2sql

Powerdns has a very nifty tool to import BIND zone files into its database.
It has a problem though, your slaves won’t receive these new zones.

This happens because the zones are inserted as type “Native”, which means that you have to rely on SQL replication or some other way to transfer your new data to the slaves.

Luckily, the fix is rather easy, the following example uses MySQL.

Go to your master server and convert all domains to type MASTER so that pdns will start to notify its slaves about this fabolous happening.

Assuming your master database is called “powerdns-master”:

update `powerdns-master`.domains set type = ‘MASTER’

Now wait a few seconds or minutes and your slaves will recieve notifcations!