Advertisement
Emulatorman

named.conf

Aug 12th, 2011
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.28 KB | None | 0 0
  1. /*
  2. * Refer to the named.conf(5) and named(8) man pages, and the documentation
  3. * in /usr/share/doc/bind-9 for more details.
  4. * Online versions of the documentation can be found here:
  5. * http://www.isc.org/software/bind/documentation
  6. *
  7. * If you are going to set up an authoritative server, make sure you
  8. * understand the hairy details of how DNS works. Even with simple mistakes,
  9. * you can break connectivity for affected parties, or cause huge amounts of
  10. * useless Internet traffic.
  11. */
  12.  
  13. acl "xfer" {
  14. /* Deny transfers by default except for the listed hosts.
  15. * If we have other name servers, place them here.
  16. */
  17. none;
  18. };
  19.  
  20. /*
  21. * You might put in here some ips which are allowed to use the cache or
  22. * recursive queries
  23. */
  24. acl "trusted" {
  25. 127.0.0.0/8;
  26. 192.168.0.0/24;
  27. ::1/128;
  28. };
  29.  
  30. options {
  31. directory "/var/bind";
  32. pid-file "/var/run/named/named.pid";
  33.  
  34. /* https://www.isc.org/solutions/dlv >=bind-9.7.x only */
  35. //bindkeys-file "/etc/bind/bind.keys";
  36.  
  37. listen-on-v6 { ::1; };
  38. listen-on { 127.0.0.1;192.168.0.0/24; };
  39.  
  40. allow-query {
  41. /*
  42. * Accept queries from our "trusted" ACL. We will
  43. * allow anyone to query our master zones below.
  44. * This prevents us from becoming a free DNS server
  45. * to the masses.
  46. */
  47. trusted;
  48. };
  49.  
  50. allow-query-cache {
  51. /* Use the cache for the "trusted" ACL. */
  52. trusted;
  53. };
  54.  
  55. allow-recursion {
  56. /* Only trusted addresses are allowed to use recursion. */
  57. trusted;
  58. };
  59.  
  60. allow-transfer {
  61. /* Zone tranfers are denied by default. */
  62. none;
  63. };
  64.  
  65. allow-update {
  66. /* Don't allow updates, e.g. via nsupdate. */
  67. none;
  68. };
  69.  
  70. /*
  71. * If you've got a DNS server around at your upstream provider, enter its
  72. * IP address here, and enable the line below. This will make you benefit
  73. * from its cache, thus reduce overall DNS traffic in the Internet.
  74. *
  75. * Uncomment the following lines to turn on DNS forwarding, and change
  76. * and/or update the forwarding ip address(es):
  77. */
  78. /*
  79. forward first;
  80. forwarders {
  81. // 123.123.123.123; // Your ISP NS
  82. // 124.124.124.124; // Your ISP NS
  83. // 4.2.2.1; // Level3 Public DNS
  84. // 4.2.2.2; // Level3 Public DNS
  85. // 8.8.8.8; // Google Open DNS
  86. // 8.8.4.4; // Google Open DNS
  87. // 200.40.220.245 // Antel Public DNS
  88. // 200.40.30.245 // Antel Public DNS
  89. };
  90.  
  91. */
  92.  
  93. //dnssec-enable yes;
  94. //dnssec-validation yes;
  95.  
  96. /* if you have problems and are behind a firewall: */
  97. //query-source address * port 53;
  98. };
  99.  
  100. /*
  101. logging {
  102. channel default_log {
  103. file "/var/log/named/named.log" versions 5 size 50M;
  104. print-time yes;
  105. print-severity yes;
  106. print-category yes;
  107. };
  108.  
  109. category default { default_log; };
  110. category general { default_log; };
  111. };
  112. */
  113.  
  114. include "/etc/bind/rndc.key";
  115. controls {
  116. inet 127.0.0.1 port 953 allow { 127.0.0.1/32; ::1/128; } keys { "rndc-key"; };
  117. };
  118.  
  119. zone "." in {
  120. type hint;
  121. file "/var/bind/root.cache";
  122. };
  123.  
  124. zone "localhost" IN {
  125. type master;
  126. file "pri/localhost.zone";
  127. notify no;
  128. };
  129.  
  130. zone "127.in-addr.arpa" IN {
  131. type master;
  132. file "pri/127.zone";
  133. notify no;
  134. };
  135.  
  136. /*
  137. * Briefly, a zone which has been declared delegation-only will be effectively
  138. * limited to containing NS RRs for subdomains, but no actual data beyond its
  139. * own apex (for example, its SOA RR and apex NS RRset). This can be used to
  140. * filter out "wildcard" or "synthesized" data from NAT boxes or from
  141. * authoritative name servers whose undelegated (in-zone) data is of no
  142. * interest.
  143. * See http://www.isc.org/software/bind/delegation-only for more info
  144. */
  145.  
  146. //zone "COM" { type delegation-only; };
  147. //zone "NET" { type delegation-only; };
  148.  
  149. //zone "YOUR-DOMAIN.TLD" {
  150. // type master;
  151. // file "/var/bind/pri/YOUR-DOMAIN.TLD.zone";
  152. // allow-query { any; };
  153. // allow-transfer { xfer; };
  154. //};
  155.  
  156. //zone "YOUR-SLAVE.TLD" {
  157. // type slave;
  158. // file "/var/bind/sec/YOUR-SLAVE.TLD.zone";
  159. // masters { <MASTER>; };
  160.  
  161. /* Anybody is allowed to query but transfer should be controlled by the master. */
  162. // allow-query { any; };
  163. // allow-transfer { none; };
  164.  
  165. /* The master should be the only one who notifies the slaves, shouldn't it? */
  166. // allow-notify { <MASTER>; };
  167. // notify no;
  168. //};
  169.  
  170. zone "quanticapc.no-ip.org" {
  171. type master;
  172. allow-transfer {none;};
  173. file "/etc/bind/pri/quanticapc.no-ip.org.zone";
  174. };
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement