Adam Tkac 98dc342
/*
Adam Tkac 98dc342
 Sample named.conf BIND DNS server 'named' configuration file
Adam Tkac 98dc342
 for the Red Hat BIND distribution.
Adam Tkac 98dc342
Adam Tkac 98dc342
 See the BIND Administrator's Reference Manual (ARM) for details, in:
Adam Tkac 98dc342
   file:///usr/share/doc/bind-{version}/arm/Bv9ARM.html
Adam Tkac 98dc342
 Also see the BIND Configuration GUI : /usr/bin/system-config-bind and 
Adam Tkac 98dc342
 its manual.
Adam Tkac 98dc342
*/
Adam Tkac 98dc342
jvdias 053216a
options
jvdias 053216a
{
jvdias 053216a
	// Put files that named is allowed to write in the data/ directory:
Adam Tkac 98dc342
	directory 		"/var/named";		// "Working" directory
jvdias 053216a
	dump-file 		"data/cache_dump.db";
jvdias 053216a
        statistics-file 	"data/named_stats.txt";
jvdias 053216a
        memstatistics-file 	"data/named_mem_stats.txt";
0b15f32
	secroots-file		"data/named.secroots";
0b15f32
	recursing-file		"data/named.recursing";
jvdias 053216a
Adam Tkac 98dc342
Adam Tkac 98dc342
	/*
Adam Tkac 98dc342
	  Specify listenning interfaces. You can use list of addresses (';' is
Adam Tkac 98dc342
	  delimiter) or keywords "any"/"none"
Adam Tkac 98dc342
	*/
Adam Tkac 98dc342
	//listen-on port 53	{ any; };
Adam Tkac 98dc342
	listen-on port 53	{ 127.0.0.1; };
Adam Tkac 98dc342
Adam Tkac 98dc342
	//listen-on-v6 port 53	{ any; };
Adam Tkac 98dc342
	listen-on-v6 port 53	{ ::1; };
Adam Tkac 98dc342
Adam Tkac 98dc342
	/*
Adam Tkac 98dc342
	  Access restrictions
Adam Tkac 98dc342
Adam Tkac 98dc342
	  There are two important options:
Adam Tkac 98dc342
	    allow-query { argument; };
Adam Tkac 98dc342
	      - allow queries for authoritative data
Adam Tkac 98dc342
Adam Tkac 98dc342
	    allow-query-cache { argument; };
Adam Tkac 98dc342
	      - allow queries for non-authoritative data (mostly cached data)
Adam Tkac 98dc342
Adam Tkac 98dc342
	  You can use address, network address or keywords "any"/"localhost"/"none" as argument
Adam Tkac 98dc342
	  Examples:
Adam Tkac 98dc342
	    allow-query { localhost; 10.0.0.1; 192.168.1.0/8; };
Adam Tkac 98dc342
	    allow-query-cache { ::1; fe80::5c63:a8ff:fe2f:4526; 10.0.0.1; };
Adam Tkac 98dc342
	*/
Adam Tkac 98dc342
Adam Tkac 98dc342
	allow-query		{ localhost; };
Adam Tkac 98dc342
	allow-query-cache	{ localhost; };
Adam Tkac 98dc342
d0fda06
	/* Enable/disable recursion - recursion yes/no;
d0fda06
d0fda06
	 - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
d0fda06
	 - If you are building a RECURSIVE (caching) DNS server, you need to enable 
d0fda06
	   recursion. 
d0fda06
	 - If your recursive DNS server has a public IP address, you MUST enable access 
d0fda06
	   control to limit queries to your legitimate users. Failing to do so will
d0fda06
	   cause your server to become part of large scale DNS amplification 
d0fda06
	   attacks. Implementing BCP38 within your network would greatly
d0fda06
	   reduce such attack surface 
d0fda06
	 */
Adam Tkac 98dc342
	recursion yes;
Adam Tkac 98dc342
Adam Tkac 98dc342
	/* DNSSEC related options. See information about keys ("Trusted keys", bellow) */
Adam Tkac 98dc342
Adam Tkac 98dc342
	/* Enable DNSSEC validation on recursive servers */
Adam Tkac 98dc342
	dnssec-validation yes;
Adam Tkac 34adbeb
93a69bb
	/* In Fedora we use /run/named instead of default /var/run/named
93a69bb
	   so we have to configure paths properly. */
Adam Tkac 2043f0c
	pid-file "/run/named/named.pid";
93a69bb
	session-keyfile "/run/named/session.key";
ad6dbbd
ad6dbbd
	managed-keys-directory "/var/named/dynamic";
71f9fb4
71f9fb4
    /* In Fedora we use system-wide Crypto Policy */
71f9fb4
    /* https://fedoraproject.org/wiki/Changes/CryptoPolicy */
71f9fb4
    include "/etc/crypto-policies/back-ends/bind.config";
jvdias 053216a
};
Adam Tkac 98dc342
jvdias 053216a
logging 
jvdias 053216a
{
jvdias 053216a
/*      If you want to enable debugging, eg. using the 'rndc trace' command,
jvdias 053216a
 *      named will try to write the 'named.run' file in the $directory (/var/named).
jvdias 053216a
 *      By default, SELinux policy does not allow named to modify the /var/named directory,
jvdias 053216a
 *      so put the default debug log file in data/ :
jvdias 053216a
 */
jvdias 053216a
        channel default_debug {
jvdias 053216a
                file "data/named.run";
jvdias 053216a
                severity dynamic;
0b15f32
        };
jvdias 053216a
};
Adam Tkac 98dc342
Adam Tkac 98dc342
/*
Adam Tkac 98dc342
 Views let a name server answer a DNS query differently depending on who is asking.
Adam Tkac 98dc342
Adam Tkac 98dc342
 By default, if named.conf contains no "view" clauses, all zones are in the 
Adam Tkac 98dc342
 "default" view, which matches all clients.
Adam Tkac 98dc342
Adam Tkac 98dc342
 Views are processed sequentially. The first match is used so the last view should
Adam Tkac 98dc342
 match "any" - it's fallback and the most restricted view.
Adam Tkac 98dc342
Adam Tkac 98dc342
 If named.conf contains any "view" clause, then all zones MUST be in a view.
Adam Tkac 98dc342
*/
Adam Tkac 98dc342
jvdias 053216a
view "localhost_resolver"
jvdias 053216a
{
jvdias 053216a
/* This view sets up named to be a localhost resolver ( caching only nameserver ).
jvdias 053216a
 * If all you want is a caching-only nameserver, then you need only define this view:
jvdias 053216a
 */
jvdias 053216a
	match-clients 		{ localhost; };
jvdias 053216a
	recursion yes;
Adam Tkac 98dc342
jvdias 053216a
	# all views must contain the root hints zone:
Adam Tkac 98dc342
	zone "." IN {
Adam Tkac 98dc342
	        type hint;
Adam Tkac 98dc342
	        file "/var/named/named.ca";
Adam Tkac 98dc342
	};
jvdias 053216a
jvdias 053216a
        /* these are zones that contain definitions for all the localhost
jvdias 053216a
         * names and addresses, as recommended in RFC1912 - these names should
Adam Tkac 95fd5e6
	 * not leak to the other nameservers:
jvdias 053216a
	 */
jvdias 053216a
	include "/etc/named.rfc1912.zones";
jvdias 053216a
};
jvdias 053216a
view "internal"
jvdias 053216a
{
jvdias 053216a
/* This view will contain zones you want to serve only to "internal" clients
jvdias 053216a
   that connect via your directly attached LAN interfaces - "localnets" .
jvdias 053216a
 */
jvdias fc31cdd
	match-clients		{ localnets; };
jvdias 053216a
	recursion yes;
jvdias 053216a
Adam Tkac 98dc342
	zone "." IN {
Adam Tkac 98dc342
	        type hint;
Adam Tkac 98dc342
	        file "/var/named/named.ca";
Adam Tkac 98dc342
	};
Adam Tkac 95fd5e6
Adam Tkac 95fd5e6
        /* these are zones that contain definitions for all the localhost
Adam Tkac 95fd5e6
         * names and addresses, as recommended in RFC1912 - these names should
Adam Tkac 95fd5e6
	 * not leak to the other nameservers:
Adam Tkac 95fd5e6
	 */
Adam Tkac 95fd5e6
	include "/etc/named.rfc1912.zones";
600bfd4
jvdias 053216a
	// These are your "authoritative" internal zones, and would probably
jvdias 053216a
	// also be included in the "localhost_resolver" view above :
jvdias 053216a
Adam Tkac 98dc342
	/*
Adam Tkac 98dc342
	  NOTE for dynamic DNS zones and secondary zones:
Adam Tkac 98dc342
Adam Tkac 98dc342
	  DO NOT USE SAME FILES IN MULTIPLE VIEWS!
Adam Tkac 98dc342
Adam Tkac 98dc342
	  If you are using views and DDNS/secondary zones it is strongly
Adam Tkac 98dc342
	  recommended to read FAQ on ISC site (www.isc.org), section
Adam Tkac 98dc342
	  "Configuration and Setup Questions", questions
Adam Tkac 98dc342
	  "How do I share a dynamic zone between multiple views?" and
Adam Tkac 98dc342
	  "How can I make a server a slave for both an internal and an external
Adam Tkac 98dc342
	   view at the same time?"
Adam Tkac 98dc342
	*/
Adam Tkac 98dc342
jvdias 053216a
	zone "my.internal.zone" { 
de4624f
		type primary;
jvdias 053216a
		file "my.internal.zone.db";
jvdias 053216a
	};
jvdias 053216a
	zone "my.slave.internal.zone" {
de4624f
		type secondary;
jvdias 053216a
		file "slaves/my.slave.internal.zone.db";
jvdias 053216a
		masters { /* put master nameserver IPs here */ 127.0.0.1; } ;
jvdias 053216a
		// put slave zones in the slaves/ directory so named can update them
jvdias 053216a
	};	
jvdias 053216a
	zone "my.ddns.internal.zone" {
de4624f
		type primary;
jvdias 053216a
		allow-update { key ddns_key; };
Adam Tkac 98dc342
		file "dynamic/my.ddns.internal.zone.db";
jvdias 053216a
		// put dynamically updateable zones in the slaves/ directory so named can update them
0b15f32
	};
jvdias 053216a
};
Adam Tkac 98dc342
jvdias 053216a
key ddns_key
jvdias 053216a
{
8b8d05f
	algorithm hmac-sha256;
8b8d05f
	secret "use /usr/sbin/ddns-confgen to generate TSIG keys";
jvdias 053216a
};
Adam Tkac 98dc342
Adam Tkac 98dc342
view "external"
jvdias 053216a
{
jvdias 053216a
/* This view will contain zones you want to serve only to "external" clients
Adam Tkac 95fd5e6
 * that have addresses that are not match any above view:
jvdias 053216a
 */
Adam Tkac 95fd5e6
	match-clients		{ any; };
jvdias 053216a
Adam Tkac 98dc342
	zone "." IN {
Adam Tkac 98dc342
	        type hint;
Adam Tkac 98dc342
	        file "/var/named/named.ca";
Adam Tkac 98dc342
	};
Adam Tkac 98dc342
jvdias 053216a
	recursion no;
jvdias 053216a
	// you'd probably want to deny recursion to external clients, so you don't
jvdias 053216a
        // end up providing free DNS service to all takers
jvdias 053216a
jvdias 053216a
	// These are your "authoritative" external zones, and would probably
jvdias 053216a
        // contain entries for just your web and mail servers:
jvdias 053216a
jvdias 053216a
	zone "my.external.zone" { 
de4624f
		type primary;
jvdias 053216a
		file "my.external.zone.db";
jvdias 053216a
	};
jvdias 053216a
};
Adam Tkac 98dc342
Adam Tkac 98dc342
/* Trusted keys
Adam Tkac 98dc342
Adam Tkac 98dc342
  This statement contains DNSSEC keys. If you want DNSSEC aware resolver you
8b8d05f
  should configure at least one trusted key.
Adam Tkac 98dc342
Adam Tkac 98dc342
  Note that no key written below is valid. Especially root key because root zone
Adam Tkac 98dc342
  is not signed yet.
Adam Tkac 98dc342
*/
Adam Tkac 98dc342
/*
8b8d05f
trust-anchors {
Adam Tkac 98dc342
// Root Key
8b8d05f
. initial-key 257 3 8 "AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3
8b8d05f
		      +/4RgWOq7HrxRixHlFlExOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kv
8b8d05f
		      ArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgCmr3EgVLrjyBxWezF
8b8d05f
		      0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+e
8b8d05f
		      oZG+SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfd
8b8d05f
		      RUfhHdY6+cn8HFRm+2hM8AnXGXws9555KrUB5qihylGa8subX2Nn6UwN
8b8d05f
		      R1AkUTV74bU=";
Adam Tkac 98dc342
Adam Tkac 98dc342
// Key for forward zone
8b8d05f
example.com. static-key 257 3 8 "AwEAAZ0aqu1rJ6orJynrRfNpPmayJZoAx9Ic2/Rl9VQW
8b8d05f
				LMHyjxxem3VUSoNUIFXERQbj0A9Ogp0zDM9YIccKLRd6
8b8d05f
				LmWiDCt7UJQxVdD+heb5Ec4qlqGmyX9MDabkvX2NvMws
8b8d05f
				UecbYBq8oXeTT9LRmCUt9KUt/WOi6DKECxoG/bWTykrX
8b8d05f
				yBR8elD+SQY43OAVjlWrVltHxgp4/rhBCvRbmdflunaP
8b8d05f
				Igu27eE2U4myDSLT8a4A0rB5uHG4PkOa9dIRs9y00M2m
8b8d05f
				Wf4lyPee7vi5few2dbayHXmieGcaAHrx76NGAABeY393
8b8d05f
				xjlmDNcUkF1gpNWUla4fWZbbaYQzA93mLdrng+M=";
8b8d05f
Adam Tkac 98dc342
Adam Tkac 98dc342
// Key for reverse zone.
8b8d05f
2.0.192.IN-ADDRPA.NET. initial-ds 31406 8 2 "F78CF3344F72137235098ECBBD08947C2C9001C7F6A085A17F518B5D8F6B916D";
Adam Tkac 98dc342
};
Adam Tkac 98dc342
*/