1 | # This file should be included in your main BIND configuration file
|
---|
2 | #
|
---|
3 | # For example with
|
---|
4 | # include "${PRIVATE_DIR}/named.conf";
|
---|
5 |
|
---|
6 | zone "${DNSDOMAIN}." IN {
|
---|
7 | type master;
|
---|
8 | file "${PRIVATE_DIR}/${DNSDOMAIN}.zone";
|
---|
9 | /*
|
---|
10 | * Attention: Not all BIND versions support "ms-self". The instead use
|
---|
11 | * of allow-update { any; }; is another, but less secure possibility.
|
---|
12 | */
|
---|
13 | update-policy {
|
---|
14 | /*
|
---|
15 | * A rather long description here, as the "ms-self" option does
|
---|
16 | * not appear in any docs yet (it can only be found in the
|
---|
17 | * source code).
|
---|
18 | *
|
---|
19 | * The short of it is that each host is allowed to update its
|
---|
20 | * own A and AAAA records, when the update request is properly
|
---|
21 | * signed by the host itself.
|
---|
22 | *
|
---|
23 | * The long description is (look at the
|
---|
24 | * dst_gssapi_identitymatchesrealmms() call in lib/dns/ssu.c and
|
---|
25 | * its definition in lib/dns/gssapictx.c for details):
|
---|
26 | *
|
---|
27 | * A GSS-TSIG update request will be signed by a given signer
|
---|
28 | * (e.g. machine-name$@${REALM}). The signer name is split into
|
---|
29 | * the machine component (e.g. "machine-name") and the realm
|
---|
30 | * component (e.g. "${REALM}"). The update is allowed if the
|
---|
31 | * following conditions are met:
|
---|
32 | *
|
---|
33 | * 1) The machine component of the signer name matches the first
|
---|
34 | * (host) component of the FQDN that is being updated.
|
---|
35 | *
|
---|
36 | * 2) The realm component of the signer name matches the realm
|
---|
37 | * in the grant statement below (${REALM}).
|
---|
38 | *
|
---|
39 | * 3) The domain component of the FQDN that is being updated
|
---|
40 | * matches the realm in the grant statement below.
|
---|
41 | *
|
---|
42 | * If the 3 conditions above are satisfied, the update succeeds.
|
---|
43 | */
|
---|
44 | grant ${REALM} ms-self * A AAAA;
|
---|
45 | };
|
---|
46 | };
|
---|
47 |
|
---|
48 | # The reverse zone configuration is optional. The following example assumes a
|
---|
49 | # subnet of 192.168.123.0/24:
|
---|
50 |
|
---|
51 | /*
|
---|
52 | zone "123.168.192.in-addr.arpa" in {
|
---|
53 | type master;
|
---|
54 | file "123.168.192.in-addr.arpa.zone";
|
---|
55 | update-policy {
|
---|
56 | grant ${REALM_WC} wildcard *.123.168.192.in-addr.arpa. PTR;
|
---|
57 | };
|
---|
58 | };
|
---|
59 | */
|
---|
60 |
|
---|
61 | # Note that the reverse zone file is not created during the provision process.
|
---|
62 |
|
---|
63 | # The most recent BIND versions (9.5.0a5 or later) support secure GSS-TSIG
|
---|
64 | # updates. If you are running an earlier version of BIND, or if you do not wish
|
---|
65 | # to use secure GSS-TSIG updates, you may remove the update-policy sections in
|
---|
66 | # both examples above.
|
---|
67 |
|
---|