166 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			166 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| /*
 | |
|  * Refer to the named.conf(5) and named(8) man pages, and the documentation
 | |
|  * in /usr/share/doc/bind-* for more details.
 | |
|  * Online versions of the documentation can be found here:
 | |
|  * https://kb.isc.org/article/AA-01031
 | |
|  *
 | |
|  * If you are going to set up an authoritative server, make sure you
 | |
|  * understand the hairy details of how DNS works. Even with simple mistakes,
 | |
|  * you can break connectivity for affected parties, or cause huge amounts of
 | |
|  * useless Internet traffic.
 | |
|  */
 | |
| 
 | |
| acl "xfer" {
 | |
| 	/* Deny transfers by default except for the listed hosts.
 | |
| 	 * If we have other name servers, place them here.
 | |
| 	 */
 | |
| 	none;
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * You might put in here some ips which are allowed to use the cache or
 | |
|  * recursive queries
 | |
|  */
 | |
| acl "trusted" {
 | |
| 	127.0.0.0/8;
 | |
| 	::1/128;
 | |
| };
 | |
| 
 | |
| options {
 | |
| 	directory "/var/bind";
 | |
| 	pid-file "/run/named/named.pid";
 | |
| 
 | |
| 	/* https://www.isc.org/solutions/dlv >=bind-9.7.x only */
 | |
| 	//bindkeys-file "/etc/bind/bind.keys";
 | |
| 
 | |
| 	listen-on-v6 { ::1; };
 | |
| 	listen-on { 127.0.0.1; };
 | |
| 
 | |
| 	allow-query {
 | |
| 		/*
 | |
| 		 * Accept queries from our "trusted" ACL.  We will
 | |
| 		 * allow anyone to query our master zones below.
 | |
| 		 * This prevents us from becoming a free DNS server
 | |
| 		 * to the masses.
 | |
| 		 */
 | |
| 		trusted;
 | |
| 	};
 | |
| 
 | |
| 	allow-query-cache {
 | |
| 		/* Use the cache for the "trusted" ACL. */
 | |
| 		trusted;
 | |
| 	};
 | |
| 
 | |
| 	allow-recursion {
 | |
| 		/* Only trusted addresses are allowed to use recursion. */
 | |
| 		trusted;
 | |
| 	};
 | |
| 
 | |
| 	allow-transfer {
 | |
| 		/* Zone tranfers are denied by default. */
 | |
| 		none;
 | |
| 	};
 | |
| 
 | |
| 	allow-update {
 | |
| 		/* Don't allow updates, e.g. via nsupdate. */
 | |
| 		none;
 | |
| 	};
 | |
| 
 | |
| 	/*
 | |
| 	* If you've got a DNS server around at your upstream provider, enter its
 | |
| 	* IP address here, and enable the line below. This will make you benefit
 | |
| 	* from its cache, thus reduce overall DNS traffic in the Internet.
 | |
| 	*
 | |
| 	* Uncomment the following lines to turn on DNS forwarding, and change
 | |
| 	*  and/or update the forwarding ip address(es):
 | |
| 	*/
 | |
| /*
 | |
| 	forward first;
 | |
| 	forwarders {
 | |
| 	//	123.123.123.123;	// Your ISP NS
 | |
| 	//	124.124.124.124;	// Your ISP NS
 | |
| 	//	4.2.2.1;		// Level3 Public DNS
 | |
| 	//	4.2.2.2;		// Level3 Public DNS
 | |
| 		8.8.8.8;		// Google Open DNS
 | |
| 		8.8.4.4;		// Google Open DNS
 | |
| 	};
 | |
| 
 | |
| */
 | |
| 
 | |
| 	//dnssec-validation yes;
 | |
| 
 | |
| 	/*
 | |
| 	 * As of bind 9.8.0:
 | |
| 	 * "If the root key provided has expired,
 | |
| 	 * named will log the expiration and validation will not work."
 | |
| 	 */
 | |
| 	dnssec-validation auto;
 | |
| 
 | |
| 	/* if you have problems and are behind a firewall: */
 | |
| 	//query-source address * port 53;
 | |
| };
 | |
| 
 | |
| /*
 | |
| logging {
 | |
| 	channel default_log {
 | |
| 		file "/var/log/named/named.log" versions 5 size 50M;
 | |
| 		print-time yes;
 | |
| 		print-severity yes;
 | |
| 		print-category yes;
 | |
| 	};
 | |
| 
 | |
| 	category default { default_log; };
 | |
| 	category general { default_log; };
 | |
| };
 | |
| */
 | |
| 
 | |
| include "/etc/bind/rndc.key";
 | |
| controls {
 | |
| 	inet 127.0.0.1 port 953 allow { 127.0.0.1/32; ::1/128; } keys { "rndc-key"; };
 | |
| };
 | |
| 
 | |
| zone "." in {
 | |
| 	type hint;
 | |
| 	file "/var/bind/named.cache";
 | |
| };
 | |
| 
 | |
| zone "localhost" IN {
 | |
| 	type master;
 | |
| 	file "pri/localhost.zone";
 | |
| 	notify no;
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * Briefly, a zone which has been declared delegation-only will be effectively
 | |
|  * limited to containing NS RRs for subdomains, but no actual data beyond its
 | |
|  * own apex (for example, its SOA RR and apex NS RRset). This can be used to
 | |
|  * filter out "wildcard" or "synthesized" data from NAT boxes or from
 | |
|  * authoritative name servers whose undelegated (in-zone) data is of no
 | |
|  * interest.
 | |
|  * See http://www.isc.org/software/bind/delegation-only for more info
 | |
|  */
 | |
| 
 | |
| //zone "COM" { type delegation-only; };
 | |
| //zone "NET" { type delegation-only; };
 | |
| 
 | |
| //zone "YOUR-DOMAIN.TLD" {
 | |
| //	type master;
 | |
| //	file "/var/bind/pri/YOUR-DOMAIN.TLD.zone";
 | |
| //	allow-query { any; };
 | |
| //	allow-transfer { xfer; };
 | |
| //};
 | |
| 
 | |
| //zone "YOUR-SLAVE.TLD" {
 | |
| //	type slave;
 | |
| //	file "/var/bind/sec/YOUR-SLAVE.TLD.zone";
 | |
| //	masters { <MASTER>; };
 | |
| 
 | |
| 	/* Anybody is allowed to query but transfer should be controlled by the master. */
 | |
| //	allow-query { any; };
 | |
| //	allow-transfer { none; };
 | |
| 
 | |
| 	/* The master should be the only one who notifies the slaves, shouldn't it? */
 | |
| //	allow-notify { <MASTER>; };
 | |
| //	notify no;
 | |
| //};
 |