ok
Direktori : /etc/ |
Current File : //etc/named.conf |
options { /* make named use port 53 for the source of all queries, to allow * firewalls to block all ports except 53: */ // query-source port 53; recursion no; /* We no longer enable this by default as the dns posion exploit has forced many providers to open up their firewalls a bit */ // Put files that named is allowed to write in the data/ directory: directory "/var/named"; // the default pid-file "/var/run/named/named.pid"; dump-file "data/cache_dump.db"; statistics-file "data/named_stats.txt"; /* memstatistics-file "data/named_mem_stats.txt"; */ allow-transfer { "none"; }; }; logging { channel default_log { file "/var/log/named/named.log" versions 5 size 128M; print-time yes; print-severity yes; print-category yes; severity warning; }; category default { default_log; }; category general { default_log; }; }; // All BIND 9 zones are in a "view", which allow different zones to be served // to different types of client addresses, and for options to be set for groups // of zones. // // By default, if named.conf contains no "view" clauses, all zones are in the // "default" view, which matches all clients. // // If named.conf contains any "view" clause, then all zones MUST be in a view; // so it is recommended to start off using views to avoid having to restructure // your configuration files in the future. view "localhost_resolver" { /* This view sets up named to be a localhost resolver ( caching only nameserver ). * If all you want is a caching-only nameserver, then you need only define this view: */ match-clients { 127.0.0.0/24; }; match-destinations { localhost; }; recursion yes; zone "." IN { type hint; file "/var/named/named.ca"; }; /* these are zones that contain definitions for all the localhost * names and addresses, as recommended in RFC1912 - these names should * ONLY be served to localhost clients: */ include "/var/named/named.rfc1912.zones"; }; view "internal" { /* This view will contain zones you want to serve only to "internal" clients that connect via your directly attached LAN interfaces - "localnets" . */ match-clients { localnets; }; match-destinations { localnets; }; recursion yes; zone "." IN { type hint; file "/var/named/named.ca"; }; // include "/var/named/named.rfc1912.zones"; // you should not serve your rfc1912 names to non-localhost clients. // These are your "authoritative" internal zones, and would probably // also be included in the "localhost_resolver" view above : zone "144.84.74.97.host.secureserver.net" { type master; file "/var/named/144.84.74.97.host.secureserver.net.db"; }; zone "exeeto.com" { type master; file "/var/named/exeeto.com.db"; }; zone "honesttrading.co.in" { type master; file "/var/named/honesttrading.co.in.db"; }; zone "walletmoney.co.in" { type master; file "/var/named/walletmoney.co.in.db"; }; zone "agriutsav.com" { type master; file "/var/named/agriutsav.com.db"; }; zone "ameyaassociates.co.in" { type master; file "/var/named/ameyaassociates.co.in.db"; }; zone "worldtradeexports.com" { type master; file "/var/named/worldtradeexports.com.db"; }; zone "camilabioscience.com" { type master; file "/var/named/camilabioscience.com.db"; }; zone "sumangalvivah.in" { type master; file "/var/named/sumangalvivah.in.db"; }; zone "webmetic.co.in" { type master; file "/var/named/webmetic.co.in.db"; }; zone "mgagrosworld.com" { type master; file "/var/named/mgagrosworld.com.db"; }; zone "pharmacleanrooms.co.in" { type master; file "/var/named/pharmacleanrooms.co.in.db"; }; zone "prismlabequipments.co.in" { type master; file "/var/named/prismlabequipments.co.in.db"; }; zone "shreemfibrotech.in" { type master; file "/var/named/shreemfibrotech.in.db"; }; zone "agroassociation.in" { type master; file "/var/named/agroassociation.in.db"; }; zone "alpinepolymerdoors.com" { type master; file "/var/named/alpinepolymerdoors.com.db"; }; zone "swastikboats.in" { type master; file "/var/named/swastikboats.in.db"; }; zone "reshacentre.in" { type master; file "/var/named/reshacentre.in.db"; }; zone "escapehousenasik.com" { type master; file "/var/named/escapehousenasik.com.db"; }; zone "gainstransforminglives.com" { type master; file "/var/named/gainstransforminglives.com.db"; }; zone "kripaent.in" { type master; file "/var/named/kripaent.in.db"; }; zone "syphase.in" { type master; file "/var/named/syphase.in.db"; }; zone "poultrypro.co.in" { type master; file "/var/named/poultrypro.co.in.db"; }; zone "kgfsahyadri.com" { type master; file "/var/named/kgfsahyadri.com.db"; }; zone "dsosatara.co.in" { type master; file "/var/named/dsosatara.co.in.db"; }; zone "krushiapp.in" { type master; file "/var/named/krushiapp.in.db"; }; zone "kgaf.in" { type master; file "/var/named/kgaf.in.db"; }; zone "cownow.in" { type master; file "/var/named/cownow.in.db"; }; }; view "external" { /* This view will contain zones you want to serve only to "external" clients * that have addresses that are not on your directly attached LAN interface subnets: */ recursion no; additional-from-cache no; // you'd probably want to deny recursion to external clients, so you don't // end up providing free DNS service to all takers // all views must contain the root hints zone: zone "." IN { type hint; file "/var/named/named.ca"; }; // These are your "authoritative" external zones, and would probably // contain entries for just your web and mail servers: // BEGIN external zone entries zone "144.84.74.97.host.secureserver.net" { type master; file "/var/named/144.84.74.97.host.secureserver.net.db"; }; zone "exeeto.com" { type master; file "/var/named/exeeto.com.db"; }; zone "honesttrading.co.in" { type master; file "/var/named/honesttrading.co.in.db"; }; zone "walletmoney.co.in" { type master; file "/var/named/walletmoney.co.in.db"; }; zone "agriutsav.com" { type master; file "/var/named/agriutsav.com.db"; }; zone "ameyaassociates.co.in" { type master; file "/var/named/ameyaassociates.co.in.db"; }; zone "worldtradeexports.com" { type master; file "/var/named/worldtradeexports.com.db"; }; zone "camilabioscience.com" { type master; file "/var/named/camilabioscience.com.db"; }; zone "sumangalvivah.in" { type master; file "/var/named/sumangalvivah.in.db"; }; zone "webmetic.co.in" { type master; file "/var/named/webmetic.co.in.db"; }; zone "mgagrosworld.com" { type master; file "/var/named/mgagrosworld.com.db"; }; zone "pharmacleanrooms.co.in" { type master; file "/var/named/pharmacleanrooms.co.in.db"; }; zone "prismlabequipments.co.in" { type master; file "/var/named/prismlabequipments.co.in.db"; }; zone "shreemfibrotech.in" { type master; file "/var/named/shreemfibrotech.in.db"; }; zone "agroassociation.in" { type master; file "/var/named/agroassociation.in.db"; }; zone "alpinepolymerdoors.com" { type master; file "/var/named/alpinepolymerdoors.com.db"; }; zone "swastikboats.in" { type master; file "/var/named/swastikboats.in.db"; }; zone "reshacentre.in" { type master; file "/var/named/reshacentre.in.db"; }; zone "escapehousenasik.com" { type master; file "/var/named/escapehousenasik.com.db"; }; zone "gainstransforminglives.com" { type master; file "/var/named/gainstransforminglives.com.db"; }; zone "kripaent.in" { type master; file "/var/named/kripaent.in.db"; }; zone "syphase.in" { type master; file "/var/named/syphase.in.db"; }; zone "poultrypro.co.in" { type master; file "/var/named/poultrypro.co.in.db"; }; zone "kgfsahyadri.com" { type master; file "/var/named/kgfsahyadri.com.db"; }; zone "dsosatara.co.in" { type master; file "/var/named/dsosatara.co.in.db"; }; zone "krushiapp.in" { type master; file "/var/named/krushiapp.in.db"; }; zone "kgaf.in" { type master; file "/var/named/kgaf.in.db"; }; zone "cownow.in" { type master; file "/var/named/cownow.in.db"; }; };