|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
|
In the earlier days of the Internet (before the mid 1980s) application programs translated host names to addresses and host addresses to names by performing a local file lookup. In the UNIX operating system, the file used was (and is) /etc/hosts. To contact a host on the Internet by name, the user needed to populate the local hosts file with the names and addresses of all hosts on the Internet. This was accomplished by transferring the file HOSTS.TXT from the server SRI-NIC using a file transfer utility like FTP. With a small network and hosts database this mechanism was adequate. However with network growth, problems with this mechanism arose.
|
At the beginning /etc/hosts file was used and syncronized periodically between servers
Example of /etc/net/host
#
# Internet host table -r
#
127.0.0.1 localhost
10.201.13.251 nti251 nti251.andipc.myfirm.com
10.201.29.251 nti251bu nti251bu.andipc.myfirm.com
10.201.13.246 loghost
Use of a local file and file transfer utility to obtain host names and addresses requires the maintenance of a central, monolithic name database. This in turn leads to several problems, the more serious of which are:
The DNS was designed to resolved those problems. At the heart of the DNS solution is a distributed naming database that solves each of the problems described previously as follows:
You can download and compile the latest version if you want, however, this may not be supported by Sun.
Note - Solaris version 8 implements BIND version 8.x.x
The DNS namespace is composed of a set of hierarchical domains arranged in a manner similar to the branches of an inverted tree. A DNS domain is represented by a branch or leaf in the DNS inverted tree.
A domain:
The top of the DNS tree contains a nameless root domain. This domain is used as a place holder and contains no naming information. The root domain is controlled by the ICANN. Below the root domain are the top-level domains. These top-level domains can be broken into two main categories: organizational and geographical domains. All top-level domains are currently controlled by the ICANN.
Organizational top domain currently include domains such as com, edu, gov, org, arpa, and so on.
Domain | Description |
---|---|
edu |
(Mostly U.S.) educational institutions like universities. |
com |
Commercial organizations and companies. |
org |
Non-commercial organizations. |
net |
Gateways and other administrative hosts on a network. |
mil |
U.S. military institutions. |
gov |
U.S. government institutions. |
uucp |
Obsolete, all site names formerly used as UUCP names without domains have been moved to this domain. |
ca | Country domains based of two letter abbreviations |
arpa | Used for inverse address lookups |
Below the top-level domains are second-level domains. The second level is typically the first place the ICANN delegates authority for the domain to some other local organization.
An organization may decide to break up their second-level domain into lower-level domains. This is generally done on an organizational, political, or as needed basis. Lower levels can be split into even lower levels as needed. All domains are subject to the naming length restrictions set out in the ''Domain Naming Rules''.
There are two types of domain names:
Domains can, in general, be nested as deeply as needed and named as desired if the following restrictions are kept in mind:
The in-addr.arpa. domain was created as a mechanism to take an IP address and represent it in domain name form. Given this representation, reverse (address to name) lookups can be performed.
The structure of the in-addr.arpa. domain consists of subdomains named after each successive octet of an IP address in descending levels of the naming tree. The net effect is to allow for the representation of the IP address 128.50.1.64 as 64.1.50.128.in-addr.arpa., for example. (Notice the IP address appears backwards in standard domain name notation.)
In addition to dividing the name space into administrative domains, the namespace is also divided into various zones of authority. These zones are superset of domains and can:
To get zone one can use dig:
dig axfr zone_name @10.201.13.252
Domains are controlled and name translations are performed by DNS servers. Although not all types of DNS servers are covered here, the following sections contain some server types and a description of each.
Root servers are positioned at the top, or root, of the DNS hierarchy, and maintain data about each of the top-level zones. There are currently (as of June, 2000) 13 root servers. Of these, nine serve the root and top-level domains, while four serve the root domain only.
The root servers are maintained by the ICANN and have been moved to a common domain for consistent naming purposes. The root servers are currently named A.rootservers.net., B.rootservers.net., and so on.
; This file holds the information on root name servers needed to ; initialize cache of Internet domain name servers ; (e.g. reference this file in the "cache . <file>" ; configuration file of BIND domain name servers). ; ; This file is made available by InterNIC ; under anonymous FTP as ; file /domain/named.root ; on server FTP.INTERNIC.NET ; -OR- RS.INTERNIC.NET ; ; last update: Jan 29, 2004 ; related version of root zone: 2004012900 ; ; ; formerly NS.INTERNIC.NET ; . 3600000 IN NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 ; ; formerly NS1.ISI.EDU ; . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 192.228.79.201 ; ; formerly C.PSI.NET ; . 3600000 NS C.ROOT-SERVERS.NET. C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 ; ; formerly TERP.UMD.EDU ; . 3600000 NS D.ROOT-SERVERS.NET. D.ROOT-SERVERS.NET. 3600000 A 128.8.10.90 ; ; formerly NS.NASA.GOV ; . 3600000 NS E.ROOT-SERVERS.NET. E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10 ; ; formerly NS.ISC.ORG ; . 3600000 NS F.ROOT-SERVERS.NET. F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241 ; ; formerly NS.ICANN.DDN.MIL ; . 3600000 NS G.ROOT-SERVERS.NET. G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4 ; ; formerly AOS.ARL.ARMY.MIL ; . 3600000 NS H.ROOT-SERVERS.NET. H.ROOT-SERVERS.NET. 3600000 A 128.63.2.53 ; ; formerly ICANN.NORDU.NET ; . 3600000 NS I.ROOT-SERVERS.NET. I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17 ; ; operated by VeriSign, Inc. ; . 3600000 NS J.ROOT-SERVERS.NET. J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30 ; ; operated by RIPE NCC ; . 3600000 NS K.ROOT-SERVERS.NET. K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129 ; ; operated by ICANN ; . 3600000 NS L.ROOT-SERVERS.NET. L.ROOT-SERVERS.NET. 3600000 A 198.32.64.12 ; ; operated by WIDE ; . 3600000 NS M.ROOT-SERVERS.NET. M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 ; End of File
This file is obtained from:
ftp://ftp.rs.internic.net/domain/named.root
Each domain must have a primary server. Primary servers have the following features:
Each domain should have at least one secondary server. In fact, the ICANN will not allow a domain to become officially registered
as a subdomain of a top-level domain until a site demonstrates two working DNS servers. Secondary servers have the following features:
Answers returned from DNS servers can be described as authoritative or non-authoritative.
Authoritative Answers. Answers from authoritative DNS servers:
DNS name resolution is what happens between the person typing the command ftp ftp.sun.com. on the command line and the client machine receiving the appropriate address to use from a DNS server.
Client Resolver Name resolution begins with client-side resolver code. Resolver code is typically built into the operating system and is available to programs using system interface calls and shared libraries.
Client resolver code provides the following features:
search corp.sun.com eng.sun.com sun.com
nameserver 128.50.1.101
The following sequence of steps is typically used by a DNS client to resolve name to address or address to name requests.
DNS name servers are configured in the Sun environment by running the in.named process. When configuring a DNS server, you need to supply the server with the following types of information:
BIND 8.x.x adds a new configuration file, /etc/named.conf, that replaces the old
/etc/named.boot file. The /etc/named.conf file establishes the server as a primary, secondary,
or cache-only name server. It also specifies the zones over which the server has authority and which data files it should read to get
its initial data.
The /etc/named.conf file contains statements that implement:
options {
DIRECTORY "/var/named";
};acl "local" { 192.168.1.0/24; 192.168.2.0/24; 192.168.3.0/24;};
zone "." in {
type hint;
file "named.root";
};
zone "zoo.edu" in {
type master;
file "zoo.edu.zone";
};
zone "1.50.128.in-addr.arpa" in {
type master;
file "zoo.edu.rzone";
};
zone "127.in-addr.arpa" in {
type master;
file "loopback-domain-info";
};
/* This is a comment */
The configuration file is read by in.named when the daemon is started by the server's start up script, /etc/init.d/inetsvc. The configuration file directs in.named either to other servers or to local data files for a specified domain.
The named.conf file contains statements and comments. Statements end with a semicolon. Some statements can contain a block of statements. Again, each statement in the block is terminated with a semicolon Table 11-2 lists named. conf statements and their definitions.
Records contained in the name server database files are called resource records. Each record contains information pertaining to a particular machine, such as its address, services running on the machine, and contact information. You can edit resource records to customize your configuration. Each line in a file is in resource record format. The general syntax of a resource record is:
[name] [ ttl] class type data
Resource records have the following fields:
Notes:
The named.root file specifies name-to-address mapping of root servers (and it is to your benefit, generally, to specify as many root servers as possible in this file).
The information in this file is described as "hints" to the name daemon process as the name daemon process attempts to contact the servers listed until one of them responds. The responding root server returns a list of root servers. The name daemon uses the list returned from the root server and not the servers specified in this file until the time-tolive expires (hence "hints").
Accordingly, it is not imperative that this file be precisely up to date, but it should be checked every few months because root servers do change from time to time.
Some features of this file are:
The following is an excerpt taken from a named.root file available at ftp://ftp.rs.internic.net/domain/named.root:
; formerly NS.INTERNIC.NET
;
. 3600000 IN NS A.ROOT-SERVERS.NET.
A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4
;
; formerly NS1.ISI.EDU
;
. 3600000 NS B.ROOT-SERVERS.NET.
B.ROOT-SERVERS.NET. 3600000 A 128.9.0.107
;
; formerly C.PSI.NET
;
. 3600000 NS C.ROOT-SERVERS.NET.
C.ROOT-SERVERS .NET. 3600000 A 192.33.4.12 ...
...
; housed in Japan, operated by WIDE
;
. 3600000 NS M.ROOT-SERVERS.NET.
M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 ; End of File
Where:
The NS and A type records are combined to define the name and address of a single root server. Additional pairs of records would
be specified in this file as appropriate.
; Information for the "forward" domain zoo.edu.
;
@ IN SOA horse.zoo.edu. hostmaster.zoo.edu. (
1 ; Serial number
43200 ; Refresh timer - 12 hours 3600 ; Retry timer - 1 hour
;
Define name
servers for this IN NS IN NS IN NS
604800 ; Expire timer - 1 week 86400 ; Time to live - 1 day )
domain.horse.zoo.edu. ; primary pea.veggie.edu. ; secondary tuna.fish.edu. ; secondary
; Glue records - needed for secondaries residing in other domains.
pea.veggie.edu. IN A 128.50.2.1
tuna.fish.edu. IN A 128.50.3.1
; Define name to address mappings for this domain.
lion IN A 128.50.1.250
lion-router IN A 128.50.2.250 # this is a router for rockway
rhino IN A 128. 50 .1.3
mule IN A 128. 50 .1.2
horse IN A 128. 50 .1.1
; CNAME aliases.
nti-router IN CNAME lion-router; Loopback domain definition (required).
localhost IN A 127.0.0.1
The SOA record is mandatory and has the following items of note:
This file contains mappings for address to name translation. Address to name translation is important and is used by such varying utilities as NFS, web servers, BIND, and the Berkeley r-command series, to name a few.
Information for the "inverse" domain 1.50.128.in-addr.arpa.
@ IN SOA horse.zoo.edu. hostmaster.zoo.edu. (
1 ; Serial number
43200 ; Refresh timer - 12 hours 3600 ; Retry timer - 1 hour 604800 ; Expire timer - 1 week 86400 ; Minimum timer - 1 day )
; Define name servers for this domain.
IN NS horse.zoo.edu.; primary
IN NS pea. veggie. edu.; secondary IN NS tuna.fish.edu.; secondary
; Define address to name mappings for this domain.
250.1.250.128.in-addr.arpa IN PTR lion.zoo.edu.
3 IN PTR rhino.zoo.edu.
2 IN PTR mule.zoo.edu.
1 IN PTR horse.zoo.edu.
Some items of note are:
Define name servers for this domain.
; Information for the loopback domain 127.in-addr.arpa.
@
IN SOA horse.zoo.edu. hostmaster.zoo.edu.
(
20060725 ; Serial number
43200 ; Refresh timer - 12 hours
3600 ; Retry timer - 1 hour
604800 ; Expire timer - 1 week
86400 ; Minimum timer - 1 day
)
IN NS horse.zoo.edu.
; Define appropriate mappings for this domain. 1.0.0 IN PTR localhost.zoo.edu.
Some items of note are:
The nsswitch.conf and resolv.conf files are required by all DNS clients and servers.
/etc/nsswitch.conf
The nsswitch.conf file specifies to the resolver library routines that the DNS is to be used in resolving host names and addresses.
Modify the ns switch. conf file by editing the hosts line so that the keyword dns appears somewhere in the list of name services. Place
this keyword last as local name services are usually consulted first.
A resulting appropriately configured file would contain a line that looks like:
hosts: files dns
This file is used to specify to the resolver library routines the domain search list to apply to any names that are not specified
in the FQDN form and to specify the IP addresses of DNS servers to query.
; resolv.conf file for DNS clients of the zoo.edu.domain.
search zoo.edu
nameserver 128.50.1.1 ; Primary Master Server for zoo
nameserver 128.50.2.1 ; Secondary Master Server for zoo
Some items of note are:
Once all of your configuration files have been entered, you will want to test your DNS domain information.
The primary test tool that comes bundled with BIND is the nslookup utility. In general, nslookup is used to do the following:
In general, you will not be able to test every record in your domain files. Test representative samples, and test a few servers in other domains to ensure that you have correctly identified the root servers.
A typical debug session might look something like the following:
Note - Much of the output has been omitted for clarity.
# nslookup
Default Server: horse.zoo.edu Address: 128.50.1.1
The server listed as the default server should be the first listed server in the /etc/resolv. conf file. This server can later be
changed using the nslookup server directive.
> ls
Server: horse.zoo.edu Address: 128.50.1.1 Name: lion.zoo.edu
Address: 128.50.1.250 >
nslookup uses a greater-than (>) prompt. The name of the server being queried is always displayed first (and will be omitted from future
examples) followed by the query and the reply.
In this example, the address (the default query) of the domain lion.zoo . edu. was requested.
> set type=ns
> zoo.edu.
...
zoo.edu. nameserver = horse.zoo.edu
horse.zoo.edu internet address = 128.50.1.1
In this example, all of the name servers for the domain are listed.
set type=ptr
128.50.1.1
...
1.1.50.128.in-addr.arpa name = horse.zoo.edu
In this example, the inverse address lookup is tested. Notice that n sl ookup allows you to enter the IP address in regular forward
notation without the trailing in-addr. arpa. domain name.
server tuna.fish.edu.
Default Server: tuna.fish.edu. Address: 128.50.3.1
>
In this example, the DNS server was changed from the
horse.zoo.edu. to the tuna.fish.edu. server.
General testing might proceed as follows:
pkill -INT in.named This signal causes the name daemon to take a snapshot of its in-memory cached data and write this information to the file /var/named/named_dump.db in ASCII (resource record) format. (Notice that the name daemon process stores its process ID number in the file /etc/named. pid at start-up. You can use this with the shell command substitution shown previously to send signals to the name daemon without having to know its process number or use the ps command to determine its process number.) Use the - INT argument to debug non-authoritative lookups.
pkill -USR1 in.named This signal causes the name daemon to increase its debug level (disabled by default) by one. Each successive increase generates more debug output. You can examine the resulting output in the /var/named/named. run file. A discussion of this file is beyond the scope of this course and is discussed in DNS & BIND. The -USR argument is used to debug authoritative lookups.
pkill -USR2 in.named This signal causes the name daemon to return to debug level 0-no debug output.
pkill -HUP in.named This signal causes the name daemon to reread all of its configuration files. If you are having problems getting the name daemon to behave, it is sometimes wise to kill and restart the name daemon process rather than use the HUP signal.
You can edit the resulting file with your text editor and examine it for problems. Here is a list of typical problems you might have and how to discover them during debugging.
The contents of the /etc/named.conf file is simpler than that of the primary server. If a server
is to provide both roles, a primary server for some domains and a secondary server for other domains, the /etc/named.conf
file must contain keywords appropriate to both of these functions.
When you add a secondary server, it is important to coordinate with the primary server. The primary server should have an NS record
for the secondary server in all files describing all domains for which the secondary will be serving. .
You should test and debug secondary servers essentially the same as primary servers (using nslookup and pkill -INT to dump the name server's database when necessary).
DNS by its nature makes networks connected to the Internet vulnerable to unauthorized access. Up to BIND version 4.9, domain administrators
had no way to control look-up data on their name servers. Solaris version 7 reduces the vulnerability of your network by implementing
BIND version 8.x.x.
BIND version 8.x.x features are established in the configuration file /etc/named.conf. This configuration file specifies the type of server it is running on and the zones that it serves as a master, slave, or stub. It also defines security, logging, and a finer granularity of options applied to zones.
The BIND version 8.x.x allow-query statement enables you to establish an IP address-based access list on queries. This list can apply to a zone, or to any queries received by the server. The access list determines which systems are allowed to send queries to the server.
Used as an argument to the options statements, allow-query imposes a restricted access list across the Internet. For example:
options { allow-query { 128.50.1.3/24; 128.50.2.2/24; } ; };
In this case, only systems with IP address 128.50.1.3 and 128.50.2.2 would have access to the name server.
In this case, only subnet zoo.edu would have access to the name server.zone "central.sun.com" {
type slave;
file "db.central";
masters { 128.50.1.1; } ; allow-query { "zoo.edu"; } ;
zone "central.sun.com" {
type master;
file "db.central";
allow-transfer { 128.50.1.2; } ;
In this case, only slave server 128.50.1.2 could perform zone transfers. Block All Transfers
The BIND default access list for zone transfers is any host. If you want to block all transfers from your name server specify the
allow-transfer host as "none".
For example:
zone "central.sun.com" {
type master;
file "db.central";
allow-transfer { none; } ;
In this case, only slave server 128.50.1.3 could perform zone transfers across the Internet.options {
allow-transfer { 128.50.1.3/24;} ;
Following are other DNS subjects to consider:
The following is a list of resources you can use when configuring DNS:
Source can be found at: http://www.isc.org/products/BIND/ Files of interest: -/etc/named.conf BINDs central configuration file -/var/named Directory containing maps -db.cache Root Server Referance -db.<domain> Host Listings, Aliases, etc. -db.XX.XX.XX Reverse Maps -db.127.0.0 Local Domain Reverse Map ********************************************************************************* DB Files: --------- You'll have several DB files. The first is the name-to-address mapping. Typically this file is named "db.<domain>". The second DB file you'll have is the address-to-name mapping, typically contained in a file named "db.xx.xx.xx" (eg: db.10.1.0). These maps are also commonly called "reverse maps". While there is generally only one name-to-address map, there should be one reverse map per network. The last map will be the loopback map, named "db.127.0.0", which obviously is also a reverse map. Note that the headers are: zone, class, type, nameserver, admin mail. This is important. The address here "ns.cuddletech.com." is the name of the primary master for "this data". The second is the email address for the DNS admin, with a "." in place of an "@". The mail address is not used by the daemon and is only for human consumption.
DB File Record Types: SOA Indicates authority for this zone data NS List a name server for this zone MX Mail Exchanger A Name-to-Address mapping PTR Address-to-Name mapping CNAME Canonical name (aliases) IN INternet Class (optional) RP Responsable Person TXT Text Field Example of name-to-address map (File: db.cuddletech) ----------------------------------------------------------------- cuddletech.com. IN SOA ns.cuddletech.com. root.ns.cuddletech.com. ( 4 ; Serial 10800 ; Refresh 3600 ; Retry 604800 ; Expire 86400 ) ; Minimum TTL ; Name Servers cuddletech.com. IN NS ns.cuddletech.com. ; Host Addresses localhost.cuddletech.com. IN A 127.0.0.1 ns.cuddletech.com. IN A 10.0.0.1 pris.cuddletech.com. IN A 10.0.0.2 deckard.cuddletech.com. IN A 10.0.0.3 ; Aliases.... nexus.cuddletech.com. IN CNAME ns.cuddletech.com. nexus6.cuddletech.com. IN CNAME ns.cuddletech.com. intraweb.cuddletech.com. IN CNAME deckard.cuddletech.com. ----------------------------------------------------------------- Example of address-to-name (reverse) map (File: db.10.0.0) ----------------------------------------------------------------- 0.0.10.in-addr.arpa. IN SOA ns.cuddletech.com. root.ns.cuddletech.com. ( 4 ; Serial 10800 ; Refresh 3600 ; Retry 604800 ; Expire 86400 ) ; Minimum TTL ; Name Servers 0.0.10.in-addr.arpa. IN NS ns.cuddletech.com. ; Canonical Names 1.0.0.10.in-addr.arpa. IN PTR ns.cuddletch.com. 2.0.0.10.in-addr.arpa. IN PTR pris.cuddletech.com. 3.0.0.10.in-addr.arpa. IN PTR deckard.cuddletech.com. ----------------------------------------------------------------- Example of loopback map (File: db.127.0.0) ----------------------------------------------------------------- 0.0.127.in-addr.arpa. IN SOA ns.cuddletch.com. root.ns.cuddletech.com. ( 4 ; Serial 10800 ; Refresh 3600 ; Retry 604800 ; Expire 86400 ) ; Minimum TTL 0.0.127.in-addr.arpa. IN NS ns.cuddletech.com. 1.0.0.127.in-addr.arpa. IN PTR localhost. ----------------------------------------------------------------- NOTE: Here are some tricks... - You can add a "@" before your SOA entry and shorten things a bit, excluding the zone name, and modifing entries like this: The record: ns.cuddletech.com. IN A 10.0.0.1 Becomes: ns IN A 10.0.0.1 Or this: 0.0.10.in-addr.arpa. IN NS ns.cuddletech.com. Becomes: IN NS ns.cuddletech.com. Or this: 2.0.0.10.in-addr.arpa. IN PTR pris.cuddletch.com. Becomes: 2 IN PRT pris.cuddletch.com. And this: intraweb.cuddletech.com. IN CNAME deckard.cuddletech.com. Becomes: intraweb IN CNAME deckard - You can omit the class in all records, the "IN". INternet Class is assumed. - Leaving the record name blank implies the last record name, repeated. In our previous examples, @ was being interpreted as the zone name, and in our example we listed the NS entry as having no entry name. That's because @ would be expanded to "0.0.10.in-addr.arpa.", and the first record is our NS entries, who's records would be named "0.0.10.in-addr.arpa."... a repeat. This is why they can be omitted. This same principle is avalible throughout the db files. - The MX type, is for mail routing. Use this to point to your MTA. Syntax is: (domain) (priority) (MTA) cuddletech.com. IN MX 1 mailhub.cuddletech.com. - The RP and TXT types work together. Their syntax is: (host) (email addr) (record) ns IN RP root.cuddletech.com. system.cuddletech.com. system IN TXT "This is an administrative system" ********************************************************************************* The Root Cache DB File: The special map thats the same everywhere (almost) is the root cache db (typically named: db.cache). This file is obtained from interNIC's ftp server, and contains the data needed to access/reference the root servers. The map can be obtained at: ftp://FTP.RS.INTERNIC.NET/domain/named.root ********************************************************************************* The BIND Configuration File: The BIND configuration file is named /etc/named.conf. If it's named /etc/named.boot your on a system loaded with BIND 4.x. Some systems will an "in" between the zone and "{", this denotes class, INternet class. The "in" (in all cases) is assumed and can be removed. Note that the MINIMUM number of zones anyone will have is FOUR. Example of BIND's config file (file: /etc/named.conf) ----------------------------------------------------------------- options { directory "/var/named"; }; zone "." { type hint; file "db.cache"; }; zone "0.0.127.in-addr.arpa" { type master; file "db.127.0.0"; }; zone "0.0.10.in-addr.arpa" { type master; file "db.10.0.0"; }; zone "cuddletech.com" { type master; file "db.cuddletech"; }; ----------------------------------------------------------------- ********************************************************************************* Setting up a SLAVE Server: Slave servers are even easier. If BIND is already installed on the server, here are the steps: 1) Copy "named.conf" from the master server to the slave. 2) Create a directory for the databases, according the the config files "directory" directive. 3) Copy the local-reverse map (db.127.0.0) and the root cache (db.cache) files into the slaves database directory. 4) Edit "named.conf", changing the map names from "type master;", to "type slave;", for all zones with the exceptions of the root cache and the local-reverse map. 5) Still editing "named.conf", add a "masters" directive to all the slave zones, in the form: "masters { XX.XX.XX.XX; };" 6) Start the server like normal. Example of a Slave BIND config file (file: /etc/named.conf) ----------------------------------------------------------------- options { directory "/var/named"; }; zone "." { type hint; file "db.cache"; }; zone "0.0.127.in-addr.arpa" { type master; file "db.127.0.0"; }; zone "0.0.10.in-addr.arpa" { type slave; file "db.10.0.0"; masters { 10.0.0.1; }; }; zone "cuddletech.com" { type slave; file "db.cuddletech"; masters { 10.0.0.1; }; }; ----------------------------------------------------------------- ********************************************************************************* BIND Signal Handling: (process: named) Signal Action ------ ------------------------------------------------------------- HUP Reload the name server. Master reloads. Slaves pull new maps. INT Dump the internal database to <directory>/named_dump.db ILL Append name server stats to named.stats in name servers cwd USR1 Append debuging info to named.run in name servers cwd USR2 Turn off debugging. WINCH Toggle logging all queries to syslog TERM Exit and save dynamic zones to files. ********************************************************************************* Building BIND from Source This is a simple process. Grab the source from ftp.isc.org/isc/bind/src/cur/bind-8/ Then unpack, change into that directory and: 1) make stdlinks 2) make clean 3) make depend 4) make 5) make install ********************************************************************************* The complete, and thorough Resource Record (RR) syntax reference: - A address (owner) (class) (ttl) A (address) Example: localhost.cuddletech.com. IN A 127.0.0.1 Where: address is a 32bit address - CNAME canonical name (owner) (class) (ttl) CNAME (canonical-dname) Example: yummy IN CNAME icecream.cuddletech.com. Where: owner is the alias, and cname is the real name - HINFO host information (owner) (class) (ttl) HINFO (cpu) (os) Example: system.cuddletech.com. IN HINFO Sun4500 Solaris Where: cpu is a string specifing the cpu and os is a string specifying the os. - MB mailbox domain name - experimental (owner) (class) (ttl) MB (mbox-dname) Example: root.cuddletech.com. IN MB ns.cuddletech.com. Where: mbox is a domain-name which specifies a host with the specified mailbox. - MD mail destination - obsolete Replaced with MX - MF mail forwarder - obsolete Replaced with MX - MG mail group member - experimental (owner) (class) (ttl) MG (mgroup-dname) Example: admin.cuddletech.com. IN MG root.cuddletech.com IN MG oracle.cuddletech.com Where: owner is the address, and mgroup is the "subscribers" - MX mail exchanger (owner) (class) (ttl) MX (preference) (exchange-dname) Example: cuddletech.com. IN MX 0 mts.cuddletech.com. Where: owner is the domain, preference is the order in which mx records should be used, and exchange is the name of the mail server. - NS name server (owner) (class) (ttl) NS (name-server-dname) Example: cuddletech.com. IN NS ns.cuddletech.com. Where: dname is the dns server, and owner is the domain - PTR pointer (owner) (class) (ttl) PTR (dname) Example: 1.100.164.192.in-addr.arpa. IN PTR system.cuddletech.com. Where: dname is the dns name, and owner is the reversed address - SOA start of authority (owner) (class) (ttl) SOA (source-dname) (mbox) "(" serial refresh retry expire minimum ")" Example: cuddletech.com. IN SOA ns.cuddletech.com. root.ns.cuddletech.com ( 1; 10800; 3600; 604800; 86400 ) Where: owner is the name of the zone, source-dname is the name of the primary name server, and where mbox is the mailbox responsible for this domain - TXT text (owner) (class) (ttl) TXT (text-string) Example: newsys.cuddletech.com. IN TXT "Location: Under the Desk" Where: owner is the owner is the system and txt-string is the description - WKS well-known service (owner) (class) (ttl) WKS (address) (protocol) (service-list) Example: server.cuddletech.com. IN WKS 10.0.0.5 TCP ( telnet ssh ftp domain ) Where: owner is the machine name, address is a 32bit address, protical is the protical name, and service list is the services to direct. -------------------- Useful Links: The DNS Resource Directory: http://www.dns.net/dnsrd/ DNS Boss Config App: http://www.dnsboss.com/ DNS Documentation: http://www.isc.org/products/BIND/bind8.html Interesting Tools: http://www.domtools.com/ ########################DAS ENDE#################################################### ########Created for & by: [email protected]####################################### ###################################################################\(^_^)/##########
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March, 12, 2019