diff --git a/bind/README.org b/bind/README.org new file mode 100644 index 0000000..a73ee98 --- /dev/null +++ b/bind/README.org @@ -0,0 +1,93 @@ +# -*- ispell-local-dictionary: "english" -*- + +#+TITLE: Bind v9 Domain name server + + +* Usage + +** Example =compose.yml= + +#+begin_src yaml + dns: + charm: bind + + options: + vars: + ## these vars are a facility to allow using `$var` in domain defs + myip: 1.2.3.4 + zones: + ## __all__ will be applied to all domains defined here + __all__: + ns: + ## '_' is translated to '@' in BIND v9 zone definition, which in + ## in turn refers to the current domain being defined. + _: (dns.mycompany.com,sdns1.ovh.net,ns6.gandi.net) + mx: + _: (1 ,(5 alt(1,2),10 alt(3,4)).)aspmx.l.google.com. + mycompany.com: + mx: + news: 10 news + + ## Names will generate IN A/CNAME depending if an IP is detected or a name + name: + ## key and values can be expanded, the syntax uses the same logic + ## than shell expansion with `{`, `}` and `,`. So this: + ## `(_,dns,core(,-01))` will demux to `_ dns core core-01`, so all + ## these keys will receive the following value. + (_,dns,core(,-01)): $myip + core-02: 4.5.6.7 + + ## You can specify after a space, a TTL that will be applied to all + ## definitions inside the section: + name 3h: + ## `www` required not to be an IP by zonecheck + (www,admin,smtp,beta,alpha,erp(,-beta)): core-01 + news: 77.32.131.26 + r.news: r.mailin.fr. + img.news: img.mailin.fr. + + spf 3h: + ## Remember that this is YAML that also offer nice syntaxic + ## feature to avoid repeating values. + _: &spf >- + v=spf1 a + a:smtp.free.fr + a:smtp.mycompany.com + include:spf.sendinblue.com + mx ?all + txt 3h: + _: + - *spf + - Sendinblue-code:xxx + - google-site-verification=yyy + + news: "v=spf1 include:spf.sendinblue.com mx ~all" + mail._domainkey(,.news): + "k=rsa;p=zzz" + + _dmarc.news: >- + v=DMARC1; + p=none; + sp=none; + rua=mailto:dmarc@mailinblue.com!10m; + ruf=mailto:dmarc@mailinblue.com!10m; + rf=afrf; + pct=100; + ri=86400 + + (othercompany.com,other-company.com): + name: + (_,www,mail): $myip + (admin,beta): www +#+end_src + + +* Persistence + +backup will keep: +- /etc/bind/rndc.key +- /etc/bind/.db.$DOMAIN files keeping a hash of the configuration along + with the given serial that matches the zone file. This is to be sure to + advertise the same serial after a recovery. + + diff --git a/bind/build/Dockerfile b/bind/build/Dockerfile new file mode 100644 index 0000000..60622f3 --- /dev/null +++ b/bind/build/Dockerfile @@ -0,0 +1,7 @@ +FROM alpine:3.12.0 + +RUN apk add --no-cache bind + +EXPOSE 53 + +CMD ["named", "-c", "/etc/bind/named.conf", "-g", "-u", "named"] \ No newline at end of file diff --git a/bind/hooks/init b/bind/hooks/init new file mode 100755 index 0000000..f16c9a8 --- /dev/null +++ b/bind/hooks/init @@ -0,0 +1,120 @@ +#!/bin/bash + +## Init is run on host +## For now it is run every time the script is launched, but +## it should be launched only once after build. + +## Accessible variables are: +## - SERVICE_NAME Name of current service +## - DOCKER_BASE_IMAGE Base image from which this service might be built if any +## - SERVICE_DATASTORE Location on host of the DATASTORE of this service +## - SERVICE_CONFIGSTORE Location on host of the CONFIGSTORE of this service + + +. lib/common + +set -e + + +## +## "${BIND_CONFIG_DIR}"/bind.keys +## + +## https://www.isc.org/bind-keys/ + +config_hash=$(docker inspect "$DOCKER_BASE_IMAGE" --format '{{ .Id }}') +if ! [ -e "${SERVICE_CONFIGSTORE}${BIND_CONFIG_DIR}"/bind.keys ]; then + mkdir -p "${SERVICE_CONFIGSTORE}${BIND_CONFIG_DIR}" + ## From alpine install + ln -sf ../../usr/share/dnssec-root/bind-dnssec-root.keys \ + "${SERVICE_CONFIGSTORE}${BIND_CONFIG_DIR}"/bind.keys +fi + + +## +## "${BIND_CONFIG_DIR}"/rndc.key +## + + +if [ -d "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/rndc.key ]; then + ## When deleting file and docker is still running, due to named + ## stopping and docker force-restart, this file will be recreated + ## as a directory To avoid issues, if we detect this condition, + ## let's just remove the directory + + rmdir "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/rndc.key +fi + +if ! [ -e "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/rndc.key ]; then + mkdir -p "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/ + docker run --rm -v "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}:${BIND_CONFIG_DIR}" \ + "$DOCKER_BASE_IMAGE" rndc-confgen -b 256 -a + if ! [ -e "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/rndc.key ]; then + err "RNDC key-file generation failed." + exit 1 + fi +fi +config_hash=$(e "$config_hash" "$(cat "${SERVICE_DATASTORE}${BIND_CONFIG_DIR}"/rndc.key)") + +init-config-add " +$SERVICE_NAME: + volumes: + - \"$SERVICE_DATASTORE${BIND_CONFIG_DIR}/rndc.key:${BIND_CONFIG_DIR}/rndc.key:ro\" +" + + +## +## "${BIND_CONFIG_DIR}"/named.conf and others +## + + + +cd src +cfg_files=("${BIND_CONFIG_DIR#/}"/{zones.rfc1918,{db,named}.*}) +for file in "${cfg_files[@]}"; do + if ! diff "$file" "$SERVICE_CONFIGSTORE"/"$file" >/dev/null 2>&1; then + cp -v "$file" "$SERVICE_CONFIGSTORE"/"$file" >&2 || exit 1 + else + echo "File $file already up to date." >&2 + fi +done +config_hash=$(p0 "$config_hash" "$(cat "${cfg_files[@]}")" | md5_compat) +cd .. + +## +## user requested zones +## + +vars_cfg=$(options-get vars 2>/dev/null) || true +zones_cfg=$(options-get zones 2>/dev/null) || true + +if [ -n "$zones_cfg" ]; then + ## will update config_hash + bind:cfg:generate "$zones_cfg" "$vars_cfg" +fi + + +uid=$(docker_get_uid "$SERVICE_NAME" "named") + +dirs=(/{etc,var/{log,cache}}/bind ) +host_dirs=() +for dir in "${dirs[@]}"; do + host_dirs+=("$SERVICE_DATASTORE$dir") +done +host_dirs+=("$SERVICE_CONFIGSTORE"/etc/bind) + +mkdir -p "${host_dirs[@]}" +find "${host_dirs[@]}" \! -user "$uid" -or -type l -print0 | while read-0 f; do + chown -v "$uid" "$f" || exit 1 +done + + +## +## Final +## + +init-config-add " +$MASTER_BASE_SERVICE_NAME: + labels: + - compose.config_hash=$config_hash +" diff --git a/bind/hooks/log_rotate-relation-joined b/bind/hooks/log_rotate-relation-joined new file mode 100755 index 0000000..8665776 --- /dev/null +++ b/bind/hooks/log_rotate-relation-joined @@ -0,0 +1,50 @@ +#!/bin/bash + +## Should be executable N time in a row with same result. + +. lib/common + +set -e + +named_uid=$(docker_get_uid "$SERVICE_NAME" "named") + +LOGS=/var/log/bind +mkdir -p "$SERVICE_DATASTORE/$LOGS" +chown -R "$named_uid" "$SERVICE_DATASTORE/$LOGS" + +rotated_count=$(relation-get rotated-count 2>/dev/null) || true +rotated_count=${rotated_count:-52} + +## XXXvlab: a lot of this intelligence should be moved away into ``logrotate`` charm +DST="$CONFIGSTORE/$TARGET_SERVICE_NAME/etc/logrotate.d/$SERVICE_NAME" +file_put "$DST" < /dev/null 2>/dev/null || true + endscript +} +EOF + +config-add "\ +services: + $MASTER_TARGET_SERVICE_NAME: + volumes: + - $DST:/etc/logrotate.d/docker-${SERVICE_NAME}:ro + - $SERVICE_DATASTORE$LOGS:/var/log/docker/$SERVICE_NAME:rw + $MASTER_BASE_SERVICE_NAME: + volumes: + - $SERVICE_DATASTORE$LOGS:$LOGS:rw +" diff --git a/bind/lib/common b/bind/lib/common new file mode 100644 index 0000000..03977fd --- /dev/null +++ b/bind/lib/common @@ -0,0 +1,331 @@ +# -*- mode: shell-script -*- + +BIND_CONFIG_DIR=/etc/bind + + +## Generate bind config files in $cfgdir from YAML configuration $cfg +bind:cfg:generate() { + local cfg="$1" vars="$2" zone_file include_zone_statements all_domain \ + domains expanded_domains zone_cfg + + ## __all__ domain is treated here like a normal domain + + expanded_domains="" + while read-0 domain zone_cfg; do + if ! [[ "$domain" =~ ^[a-z0-9_\(\),.-]+$ ]]; then + err "Invalid domain '$domain' as key in ${WHITE}zones${NORMAL} records." + return 1 + fi + domains=() + bind:parse:expand-in "$domain" domains "$vars" || return 1 + for domain in "${domains[@]}"; do + expanded_domains=$(merge_yaml_str "$expanded_domains" \ + "$(yaml_key_val_str "$domain" "$zone_cfg")") + done + done < <(e "$cfg" | shyaml key-values-0) + + ## __all__ domain is merged in other domain domain + + all_domain=$(e "$expanded_domains" | shyaml get-value "__all__") + resolved_domains="" + while read-0 domain zone_cfg; do + if [ "$domain" == "__all__" ]; then + continue + fi + resolved_domains=$(merge_yaml_str \ + "$resolved_domains" \ + "$(yaml_key_val_str "$domain" "$all_domain")" \ + "$(yaml_key_val_str "$domain" "$zone_cfg")") + done < <(e "$expanded_domains" | shyaml key-values-0) + + include_zone_statements= + while read-0 domain zone_cfg; do + info "Considering ${WHITE}$domain${NORMAL} zone configuration" + zone_file="${BIND_CONFIG_DIR}/db.${domain}" + zone_hash_file="${BIND_CONFIG_DIR}/.db.${domain}.hash" + zone_def=$(bind:content:zone_definition \ + "$domain" "$zone_cfg" "$vars") || return 1 + zone_def_hash=$(H "$zone_def") + + ## We need to store the last serial as well as the last hash in + ## the datastore to allow a full restore (will correct serials) + ## without discontinuity of services. + + current_hash= + current_serial= + if [ -e "${SERVICE_DATASTORE}${zone_hash_file}" ]; then + current_hash_content="$(cat "${SERVICE_DATASTORE}${zone_hash_file}")" || true + current_hash=${current_hash_content% *} + current_serial=${current_hash_content#* } + echo " found a previous hash file with serial: $current_serial" >&2 + fi + + if [ "$current_hash" == "$zone_def_hash" ]; then ## no need to change full serial + echo " can use previous serial as zone definition seems to have not changed" >&2 + serial=${current_serial} + else + echo " needs a new serial as zone definition seems to have changed" >&2 + date=$(date +%Y%m%d) + if [ "$date" == "${current_serial:0:8}" ]; then + serial="$date$(printf "%02d" "$((${current_serial: -2:2} + 1))")" + echo " increment serial to $serial" >&2 + else + serial="${date}00" + echo " first definition for the current date" >&2 + fi + fi + zone_def=$(e "$zone_def" | sed -r "s/%%SERIAL%%/$serial/g") + if ! [ -e "${SERVICE_CONFIGSTORE}${zone_file}" ] || + [ "$zone_def" != "$(cat "${SERVICE_CONFIGSTORE}${zone_file}")" ]; then + echo " ${DARKYELLOW}writing${NORMAL} zone def file to config with serial $serial." >&2 + e "${zone_def}" > "${SERVICE_CONFIGSTORE}${zone_file}" + else + echo " zone def already available in config with serial $serial." >&2 + fi + if ! [ -e "${SERVICE_DATASTORE}${zone_hash_file}" ] || + [ "$zone_def_hash $serial" != "$(cat "${SERVICE_DATASTORE}${zone_hash_file}")" ]; then + echo " ${DARKYELLOW}writing${NORMAL} zone file hash to data with serial $serial." >&2 + e "$zone_def_hash $serial" > "${SERVICE_DATASTORE}${zone_hash_file}" + else + echo " zone def hash already available in data with serial $serial." >&2 + fi + + include_zone_statements+=$( + bind:content:include_zone_statement "$domain" "${zone_file}" + )$'\n' + config_hash=$(p0 "$config_hash" "$zone_def_hash" | md5_compat) || exit 1 + done < <(e "$resolved_domains" | shyaml key-values-0) + + e "$include_zone_statements" > "${SERVICE_CONFIGSTORE}${BIND_CONFIG_DIR}/named.conf.local" +} + + +bind:content:include_zone_statement() { + local domain="$1" zone_file="$2" + + cat <&2 + echo " Please use a number of seconds or use one-character time units (IE: 1w, 1h30, 3600)" >&2 + return 1 + fi + return 0 +} + +bind:parse:expand-in() { + local value="$1" aname="$2" vars="$3" + + if ! [[ "$value" =~ ^[a-z0-9_\(\)\ \$,.-]+$ ]]; then + err "Invalid value '$value' to expand." + return 1 + fi + declare -n cur="$aname" + if [[ "$value" == *","* ]]; then + value="${value//\(/\{}" + value="${value//\)/\}}" + value="${value// /\\ }" + else + value="\"$value\"" + fi + + value="${value//\$/\$_vars_}" + while read-0 label v; do + local "_vars_$label"="$v" + done < <(e "$vars" | shyaml key-values-0) + eval "cur+=($value)" || { + err "Couldn't eval '$value'." + return 1 + } +} + +bind:content:zone_definition() { + local domain="$1" zone_cfg="$2" vars_cfg="$3" \ + vtype cache_file="$CACHEDIR/$FUNCNAME.cache.$(H "$@")" + if [ -e "$cache_file" ]; then + # debug "$FUNCNAME: cache hit ($*)" + cat "$cache_file" + return 0 + fi + + ## Zone definition is created with %%SERIAL%% as placeholder in + ## the serial number intended final emplacement. This allows to + ## check the output's hash of this function to decide if we need + ## to change the serial. + + zone_cfg=$(merge_yaml_str " +\$ttl: 1w +soa: + email: dns@${domain} + refresh: 8h + retry: 4h + expire: 1w + ttl: 1d +ns: + _: dns +" "$zone_cfg") || return 1 + + vars_cfg=$(merge_yaml_str " +mydomain: \"$domain\" +" "$vars_cfg") || return 1 + + while read-0 key subcfg; do + # echo "KEY: $key" >&2 + # echo "SUBCONFIG:" >&2 + # echo "$subcfg" | prefix " | " >&2 + declare -A decls + ttl= + if [[ "$key" == *" "* ]]; then + ttl=${key#* } + key=${key%% *} + fi + case "$key" in + "\$"*) + case "$key" in + "\$ttl") + bind:check:is_time ttl "$subcfg" || return 1 + ;; + *) + echo "Unsupported variable '${key}'." >&2 + return 1 + esac + decls[vars]+="${key^^} $subcfg"$'\n' + ;; + soa) + soa_values="$(printf "%-12s ; %s" "%%SERIAL%%" "serial")"$'\n' + for k in refresh retry expire ttl; do + value=$(e "$subcfg" | shyaml get-value "$k" 2>/dev/null) || { + err "Couldn't find any value for '$k' in '${domain}''s 'soa' config." + return 1 + } + bind:check:is_time "soa.$k" "$value" || { + err "Error while reading soa definition of domain '$domain'." + return 1 + } + soa_values+="$(printf "%-12s ; %s" "$value" "$k")"$'\n' + done + email=$(e "$subcfg" | shyaml get-value "email" 2>/dev/null) || { + err "Couldn't find any value for 'email' in '${domain}''s 'soa' config." + return 1 + } + soa_values="$(e "$soa_values" | prefix " ")" + decls[soa]+="$(printf "%-28s IN SOA %s. %s. (" "@" "${domain}" "${email/@/.}")"$'\n' + decls[soa]+="${soa_values}"$'\n'")"$'\n' + + ;; + ns|mx|name|spf|txt) + while read-0 name name_cfg; do + if ! [[ "$name" =~ ^[a-z0-9_\(\),.-]+$ ]]; then + err "Invalid name '$name' in ${domain}'s $key records." + return 1 + fi + names=() + bind:parse:expand-in "$name" names "$vars_cfg" || return 1 + ## values + vtype=$(e "$name_cfg" | shyaml get-type) + # echo TYPE: $vtype >&2 + values=() + case "$vtype" in + "sequence") + array_read-0 values < <(e "$name_cfg" | shyaml get-values-0) + ;; + "str") + values=("$(e "$name_cfg" | shyaml get-value)") + ;; + *) + err "Unsupported type '$vtype' of '$key' in $domain's zone definition." + exit 1 + ;; + esac + values_expanded=() + for value in "${values[@]}"; do + case "$key" in + ns|name) + if ! [[ "$value" =~ ^[a-z0-9_\$\(\),.-]+$ ]]; then + err "Invalid value '$value' in ${domain}'s $key records for '$name'." + return 1 + fi + ## Append in values_expanded + bind:parse:expand-in "$value" values_expanded "$vars_cfg" || return 1 + ;; + mx) + ## space is allowed (actually mandatory) + if ! [[ "$value" =~ ^[a-z0-9_\$\(\),.\ -]+$ ]]; then + err "Invalid value '$value' in ${domain}'s $key records for '$name'." + return 1 + fi + ## Append in values_expanded + bind:parse:expand-in "$value" values_expanded "$vars_cfg" || return 1 + ;; + spf|txt) + ## No expansion for them + values_expanded+=("\"$value\"") + ;; + esac + done + + for name in "${names[@]}"; do + [ "$name" == "_" ] && name="@" + + for value in "${values_expanded[@]}"; do + rkey="$key" + if [ "$key" == "name" ]; then + if [[ "$value" =~ ^([0-9]{1,3}\.){3,3}[0-9]{1,3}$ ]]; then + rkey="a" + elif [[ "$value" =~ ^([a-z0-9-]+\.?)+$ ]]; then + rkey="cname" + elif [ -z "$value" ]; then + err "Empty value for 'name' '$name', was '${values[@]}' before evaluation" + echo " in '$domain' zone definition." >&2 + return 1 + else + err "Unrecognised value for 'name': '$value'." + echo " in '$domain' zone definition." >&2 + return 1 + fi + fi + if [ -z "$value" ]; then + err "Empty value for 'name' '$name'." + echo " in '$domain' zone definition." >&2 + return 1 + fi + decls[$rkey]+=$(printf "%-15s %-12s IN %s %s" "$name" "$ttl" "${rkey^^}" "$value")$'\n' + done + done + done < <(e "$subcfg" | shyaml key-values-0) + ;; + *) + err "Unknown keyword '$key' in '$domain' zone definition." + return 1 + esac + done < <(e "$zone_cfg" | shyaml key-values-0) + for k in vars soa ns mx a cname spf txt; do + [ -z "${decls[$k]}" ] && continue + if [ "$k" != "vars" ]; then + echo + echo + echo ";; $k" + echo + fi + echo "${decls[$k]}" | grep -v "^$" | { + case "$k" in + a|ns|cname|spf|txt|vars) + sort + ;; + soa|mx) + cat + ;; + esac + } + done | tee "$cache_file" +} \ No newline at end of file diff --git a/bind/metadata.yaml b/bind/metadata.yaml new file mode 100644 index 0000000..078e983 --- /dev/null +++ b/bind/metadata.yaml @@ -0,0 +1,27 @@ +name: bind +summary: "BIND v9 Domain Name Server" +maintainer: "Valentin Lab " +inherit: base-0k +description: | + Installs a Domain Name Server. +config-resources: + - /etc/bind +data-resources: + - /var/log/bind + - /var/cache/bind + + +uses: + log-rotate: + #constraint: required | recommended | optional + #auto: pair | summon | none ## default: pair + constraint: recommended + auto: pair + solves: + unmanaged-logs: "in docker logs" + #default-options: + backup: + constraint: recommended + auto: pair + solves: + backup: "Automatic regular backup" diff --git a/bind/src/etc/bind/db.0 b/bind/src/etc/bind/db.0 new file mode 100644 index 0000000..e3aabdb --- /dev/null +++ b/bind/src/etc/bind/db.0 @@ -0,0 +1,12 @@ +; +; BIND reverse data file for broadcast zone +; +$TTL 604800 +@ IN SOA localhost. root.localhost. ( + 1 ; Serial + 604800 ; Refresh + 86400 ; Retry + 2419200 ; Expire + 604800 ) ; Negative Cache TTL +; +@ IN NS localhost. diff --git a/bind/src/etc/bind/db.127 b/bind/src/etc/bind/db.127 new file mode 100644 index 0000000..cd05bef --- /dev/null +++ b/bind/src/etc/bind/db.127 @@ -0,0 +1,13 @@ +; +; BIND reverse data file for local loopback interface +; +$TTL 604800 +@ IN SOA localhost. root.localhost. ( + 1 ; Serial + 604800 ; Refresh + 86400 ; Retry + 2419200 ; Expire + 604800 ) ; Negative Cache TTL +; +@ IN NS localhost. +1.0.0 IN PTR localhost. diff --git a/bind/src/etc/bind/db.255 b/bind/src/etc/bind/db.255 new file mode 100644 index 0000000..e3aabdb --- /dev/null +++ b/bind/src/etc/bind/db.255 @@ -0,0 +1,12 @@ +; +; BIND reverse data file for broadcast zone +; +$TTL 604800 +@ IN SOA localhost. root.localhost. ( + 1 ; Serial + 604800 ; Refresh + 86400 ; Retry + 2419200 ; Expire + 604800 ) ; Negative Cache TTL +; +@ IN NS localhost. diff --git a/bind/src/etc/bind/db.empty b/bind/src/etc/bind/db.empty new file mode 100644 index 0000000..8a12858 --- /dev/null +++ b/bind/src/etc/bind/db.empty @@ -0,0 +1,14 @@ +; BIND reverse data file for empty rfc1918 zone +; +; DO NOT EDIT THIS FILE - it is used for multiple zones. +; Instead, copy it, edit named.conf, and use that copy. +; +$TTL 86400 +@ IN SOA localhost. root.localhost. ( + 1 ; Serial + 604800 ; Refresh + 86400 ; Retry + 2419200 ; Expire + 86400 ) ; Negative Cache TTL +; +@ IN NS localhost. diff --git a/bind/src/etc/bind/db.local b/bind/src/etc/bind/db.local new file mode 100644 index 0000000..2f272d4 --- /dev/null +++ b/bind/src/etc/bind/db.local @@ -0,0 +1,14 @@ +; +; BIND data file for local loopback interface +; +$TTL 604800 +@ IN SOA localhost. root.localhost. ( + 2 ; Serial + 604800 ; Refresh + 86400 ; Retry + 2419200 ; Expire + 604800 ) ; Negative Cache TTL +; +@ IN NS localhost. +@ IN A 127.0.0.1 +@ IN AAAA ::1 diff --git a/bind/src/etc/bind/db.root b/bind/src/etc/bind/db.root new file mode 100644 index 0000000..6c19741 --- /dev/null +++ b/bind/src/etc/bind/db.root @@ -0,0 +1,88 @@ +; This file holds the information on root name servers needed to +; initialize cache of Internet domain name servers +; (e.g. reference this file in the "cache . " +; configuration file of BIND domain name servers). +; +; This file is made available by InterNIC +; under anonymous FTP as +; file /domain/named.cache +; on server FTP.INTERNIC.NET +; -OR- RS.INTERNIC.NET +; +; last update: Jan 3, 2013 +; related version of root zone: 2013010300 +; +; formerly NS.INTERNIC.NET +; +. 3600000 IN NS A.ROOT-SERVERS.NET. +A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 +A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:BA3E::2:30 +; +; FORMERLY NS1.ISI.EDU +; +. 3600000 NS B.ROOT-SERVERS.NET. +B.ROOT-SERVERS.NET. 3600000 A 192.228.79.201 +; +; FORMERLY C.PSI.NET +; +. 3600000 NS C.ROOT-SERVERS.NET. +C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 +; +; FORMERLY TERP.UMD.EDU +; +. 3600000 NS D.ROOT-SERVERS.NET. +D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13 +D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2D::D +; +; FORMERLY NS.NASA.GOV +; +. 3600000 NS E.ROOT-SERVERS.NET. +E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10 +; +; FORMERLY NS.ISC.ORG +; +. 3600000 NS F.ROOT-SERVERS.NET. +F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241 +F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2F::F +; +; FORMERLY NS.NIC.DDN.MIL +; +. 3600000 NS G.ROOT-SERVERS.NET. +G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4 +; +; FORMERLY AOS.ARL.ARMY.MIL +; +. 3600000 NS H.ROOT-SERVERS.NET. +H.ROOT-SERVERS.NET. 3600000 A 128.63.2.53 +H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::803F:235 +; +; FORMERLY NIC.NORDU.NET +; +. 3600000 NS I.ROOT-SERVERS.NET. +I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17 +I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7FE::53 +; +; OPERATED BY VERISIGN, INC. +; +. 3600000 NS J.ROOT-SERVERS.NET. +J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30 +J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:C27::2:30 +; +; OPERATED BY RIPE NCC +; +. 3600000 NS K.ROOT-SERVERS.NET. +K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129 +K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7FD::1 +; +; OPERATED BY ICANN +; +. 3600000 NS L.ROOT-SERVERS.NET. +L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42 +L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:3::42 +; +; OPERATED BY WIDE +; +. 3600000 NS M.ROOT-SERVERS.NET. +M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 +M.ROOT-SERVERS.NET. 3600000 AAAA 2001:DC3::35 +; End of File diff --git a/bind/src/etc/bind/named.conf b/bind/src/etc/bind/named.conf new file mode 100644 index 0000000..f2b4b65 --- /dev/null +++ b/bind/src/etc/bind/named.conf @@ -0,0 +1,3 @@ +include "/etc/bind/named.conf.options"; +include "/etc/bind/named.conf.local"; +include "/etc/bind/named.conf.default-zones"; diff --git a/bind/src/etc/bind/named.conf.default-zones b/bind/src/etc/bind/named.conf.default-zones new file mode 100644 index 0000000..355338b --- /dev/null +++ b/bind/src/etc/bind/named.conf.default-zones @@ -0,0 +1,30 @@ +// prime the server with knowledge of the root servers +zone "." { + type hint; + file "/etc/bind/db.root"; +}; + +// be authoritative for the localhost forward and reverse zones, and for +// broadcast zones as per RFC 1912 + +zone "localhost" { + type master; + file "/etc/bind/db.local"; +}; + +zone "127.in-addr.arpa" { + type master; + file "/etc/bind/db.127"; +}; + +zone "0.in-addr.arpa" { + type master; + file "/etc/bind/db.0"; +}; + +zone "255.in-addr.arpa" { + type master; + file "/etc/bind/db.255"; +}; + + diff --git a/bind/src/etc/bind/named.conf.options b/bind/src/etc/bind/named.conf.options new file mode 100644 index 0000000..31142c1 --- /dev/null +++ b/bind/src/etc/bind/named.conf.options @@ -0,0 +1,56 @@ +options { + directory "/var/cache/bind"; + + // If there is a firewall between you and nameservers you want + // to talk to, you may need to fix the firewall to allow multiple + // ports to talk. See http://www.kb.cert.org/vuls/id/800113 + + // If your ISP provided one or more IP addresses for stable + // nameservers, you probably want to use them as forwarders. + // Uncomment the following block, and insert the addresses replacing + // the all-0's placeholder. + + // forwarders { + // 0.0.0.0; + // }; + + //======================================================================== + // If BIND logs error messages about the root key being expired, + // you will need to update your keys. See https://www.isc.org/bind-keys + //======================================================================== + dnssec-validation auto; + + auth-nxdomain no; # conform to RFC1035 + // listen-on-v6 { any; }; + + // allow-recursion yes; + allow-recursion { 127.0.0.1; 172.210/16; 172.18/16; 51.255.66.199;}; + allow-recursion-on { any;}; + + +}; + + +logging { + channel warning + { + file "/var/log/bind/dns.warnings.log"; + severity warning; + print-category yes; + print-severity yes; + print-time yes; + }; + + channel general_dns + { + file "/var/log/bind/dns.log"; + severity info; + print-category yes; + print-severity yes; + print-time yes; + }; + + category default { warning; } ; + category queries { general_dns; } ; +}; + diff --git a/bind/src/etc/bind/zones.rfc1918 b/bind/src/etc/bind/zones.rfc1918 new file mode 100644 index 0000000..03b5546 --- /dev/null +++ b/bind/src/etc/bind/zones.rfc1918 @@ -0,0 +1,20 @@ +zone "10.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; + +zone "16.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "17.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "18.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "19.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "20.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "21.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "22.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "23.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "24.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "25.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "26.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "27.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "28.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "29.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "30.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; +zone "31.172.in-addr.arpa" { type master; file "/etc/bind/db.empty"; }; + +zone "168.192.in-addr.arpa" { type master; file "/etc/bind/db.empty"; };