| 1 | # This file should be included in your main BIND configuration file | 
|---|
| 2 | # | 
|---|
| 3 | # For example with | 
|---|
| 4 | # include "${PRIVATE_DIR}/named.conf"; | 
|---|
| 5 |  | 
|---|
| 6 | zone "${DNSDOMAIN}." IN { | 
|---|
| 7 | type master; | 
|---|
| 8 | file "${PRIVATE_DIR}/${DNSDOMAIN}.zone"; | 
|---|
| 9 | /* | 
|---|
| 10 | * Attention: Not all BIND versions support "ms-self". The instead use | 
|---|
| 11 | * of allow-update { any; }; is another, but less secure possibility. | 
|---|
| 12 | */ | 
|---|
| 13 | update-policy { | 
|---|
| 14 | /* | 
|---|
| 15 | * A rather long description here, as the "ms-self" option does | 
|---|
| 16 | * not appear in any docs yet (it can only be found in the | 
|---|
| 17 | * source code). | 
|---|
| 18 | * | 
|---|
| 19 | * The short of it is that each host is allowed to update its | 
|---|
| 20 | * own A and AAAA records, when the update request is properly | 
|---|
| 21 | * signed by the host itself. | 
|---|
| 22 | * | 
|---|
| 23 | * The long description is (look at the | 
|---|
| 24 | * dst_gssapi_identitymatchesrealmms() call in lib/dns/ssu.c and | 
|---|
| 25 | * its definition in lib/dns/gssapictx.c for details): | 
|---|
| 26 | * | 
|---|
| 27 | * A GSS-TSIG update request will be signed by a given signer | 
|---|
| 28 | * (e.g. machine-name$@${REALM}).  The signer name is split into | 
|---|
| 29 | * the machine component (e.g. "machine-name") and the realm | 
|---|
| 30 | * component (e.g. "${REALM}").  The update is allowed if the | 
|---|
| 31 | * following conditions are met: | 
|---|
| 32 | * | 
|---|
| 33 | * 1) The machine component of the signer name matches the first | 
|---|
| 34 | * (host) component of the FQDN that is being updated. | 
|---|
| 35 | * | 
|---|
| 36 | * 2) The realm component of the signer name matches the realm | 
|---|
| 37 | * in the grant statement below (${REALM}). | 
|---|
| 38 | * | 
|---|
| 39 | * 3) The domain component of the FQDN that is being updated | 
|---|
| 40 | * matches the realm in the grant statement below. | 
|---|
| 41 | * | 
|---|
| 42 | * If the 3 conditions above are satisfied, the update succeeds. | 
|---|
| 43 | */ | 
|---|
| 44 | grant ${REALM} ms-self * A AAAA; | 
|---|
| 45 | }; | 
|---|
| 46 | }; | 
|---|
| 47 |  | 
|---|
| 48 | # The reverse zone configuration is optional.  The following example assumes a | 
|---|
| 49 | # subnet of 192.168.123.0/24: | 
|---|
| 50 |  | 
|---|
| 51 | /* | 
|---|
| 52 | zone "123.168.192.in-addr.arpa" in { | 
|---|
| 53 | type master; | 
|---|
| 54 | file "123.168.192.in-addr.arpa.zone"; | 
|---|
| 55 | update-policy { | 
|---|
| 56 | grant ${REALM_WC} wildcard *.123.168.192.in-addr.arpa. PTR; | 
|---|
| 57 | }; | 
|---|
| 58 | }; | 
|---|
| 59 | */ | 
|---|
| 60 |  | 
|---|
| 61 | # Note that the reverse zone file is not created during the provision process. | 
|---|
| 62 |  | 
|---|
| 63 | # The most recent BIND versions (9.5.0a5 or later) support secure GSS-TSIG | 
|---|
| 64 | # updates.  If you are running an earlier version of BIND, or if you do not wish | 
|---|
| 65 | # to use secure GSS-TSIG updates, you may remove the update-policy sections in | 
|---|
| 66 | # both examples above. | 
|---|
| 67 |  | 
|---|