Centos7 configure YUM to install the DNS Service
1. Configure the DNS address
vim
/etc/resolv
.conf
nameserver192.168.1.100
# Note: the address here is the address of your local DNS server.
2. Install dns
yum
install
bindbind-utils
3. Start the service
Start DNS Service: servicenamedstart
Restart the DNS service: systemctlrestartnamed. service
Set boot start: systemctl
enable
named
4. Edit the dns configuration file
vim
/etc/named
.conf
options{
listen-onport53{any;};
listen-on-v6port53{::1;};
DNS in Linux.
Create a key
To achieve dynamic dns updates, you must first consider how to ensure secure implementation of ddns. The method provided by ISC is to create a key for dynamic updates, which is used for verification during updates. To implement this function, run the following command as root:Root @ slack9:/etc # DNSSEC-keygen-A HMAC-MD5-B 128-N user myddnsKmyddns. + 157 + 37662The function of the above
of iptables and SELinux (if you do not know about these two items, You can temporarily disable them)
Step 8: Use (DIG/NSLookup) to query DNS resource records on Linux/Windows hosts.
2.1 install bind
1 [[emailprotected] ~]# yum -y install bind2.2 configure the master configuration file
1 [[email protected] ~] # Cat/etc/named. conf 2 ...... 3 options {4 listen-on port 53 {127.0.0.1;}; 5 listen-on-v6 port 53 {: 1;}; 6 directory "/var/named "; # store the root directory of the region file. The r
segment: logging {...} zone configuration segment: zone {...} Those zones that are parsed by this machine, or the areas that are forwarded Note: Each configuration statement must end with a semicolon; 650) this.width=650; "title=" 11.png "alt=" wkiol1nks2yzwgaeaacgvjr0-z8360.png-wh_50 "src=" https://s1.51cto.com/wyfs02/ M00/a7/41/wkiol1nks2yzwgaeaacgvjr0-z8360.png-wh_500x0-wm_3-wmp_4-s_1774922531.png "/> Configuration of the cache name server:The cache name server is usually set up in
} interval#slave从master更新失败的重试间隔#在无法联系master的情况下多久slave停止服务3600) #对否定回答的缓存时间In NS dns1.long.com. #指定本域中权威DNS服务器In NS dns2.long.com. #让主域知道还有个从域Dns1 in NS 192.168.1.1Dns2 in NS 192.168.1.2 #假设从域的IP地址是192.168.1.2Liu in A 192.168.1.10Test in A 192.168.1.15Save, edit the primary domain's master profile/etc/named.confRun Command vim/etc/named.confFind the two dnssec-enables and dnssec-validation, change Yes to N
configuration, with the user location changes, automatically switch to different firewall configuration.
6, DNSSEC support: Enhanced domain name Resolution Protocol standards, the old DNS is risky, so added to the DNS enhanced version of the DNSSEC support.
7. NAP Network Rights protection: This is the feature introduced in Vista, continue to inherit. The computer can be tested for health.
8, DirectAcce
running
Add named to the startup entry and start with the operating system.echo "/usr/local/named/sbin/named-c/usr/local/named/etc/named.conf" >>/etc/rc.local
############ #从dns配置Compile installation, generate rndc.conf, and named.conf and master library operations
VI Named.conf added at the backOptions {Version "Guess";Allow-transfer {none;};Directory "/USR/LOCAL/NAMED/ETC";Dump-file "/usr/local/named/var/cache_dump.db";Statistics-file "/usr/local/named/var/named_stats.txt";Memstatistics-fi
: 192.168.80.0/25, the IP used by Unicom customers is: 192.168.80.128/25.PS: It is recommended to initialize a clean environment when doing experiments. (Recommended after DNS restart is configured.)
2. Delete the master profile root zone definition, because implementing smart Domain name resolution requires that all zones be added to the view--vi /etc/named.conf[named.conf]#删除此部分(注意“listen-on port 53”、“allow-query”、“dnssec-enable”、“
When buying a domain name or host on a foreign internet, some products will provide promo code or Coupon code, which can save a lot of money.
In general, Google can search, I also search on the Yahoo has been, today I went to http://www.scoreadeal.com on the search to a promo code, in the Godaddy used, it really works, saving 1 of dollars.
Appendix: GoDaddy Coupon Code:
Code:hash3Discount: $6.95. COM regist
other is SHA256. If you want to hold Startssl as your CA, which certificate should you use? You may be able to use these two, but if I don't tell you, how do you know there's a root certificate?
Conversely, a hash of the public key does not have this problem:
The browser assumes that the child certificate is fixed: It is always the starting point for the certificate chain. A child certificate must carry a signature that is a valid signature from its parent certificate that is specifically iss
through the discount code hostease order can also enjoy 20% of the price concessions. Therefore, the Hostease host is a good choice object.
Strong attack-resistant hosts
With the increase of internet intrusion and the improvement of hacker attack level, network security is facing a severe test. In order to minimize the risk of Web site security, people in the selection of virtual host to choose those who are strong attack-resistant host. And in the prevention of attack, Hostease host has done
Vulnerability Update Time:Vulnerability causeDesign ErrorHazard levelLowImpact SystemDebian bind 9Unaffected SystemHazardsRemote attackers can exploit this vulnerability to stop the BIND service program from responding.Attack ConditionsAttackers must access isc bind.Vulnerability InformationIsc bind is a DNS protocol implementation.When processing domain updates, an authoritative server has a race condition error. Attackers can trigger this vulnerability through dynamic DNS updates or incrementa
Linux 9.0 As the DDNS Server and runs the DNS and DHCP services at the same time. The DNS Server uses Bind 9.2.2, And the DHCP Server uses the DHCP Server v3.0pl2.
The following describes how to implement secure and Dynamic DNS in Linux.
Create a key
To achieve dynamic DNS updates, you must first consider how to ensure secure implementation of DDNS. The method provided by ISC is to create a key for dynamic updates, which is used for verification during updates. To implement this function, run
virtual machines to simulate DNS spoofing attacks.
The tool used is Ettercap.
First, let's look at the Target target,
Obviously, the IP address directed to www.baidu.com is correct. Then we use ettercap to perform DNS Spoofing. First, find etter. dns configuration file and edit and add A record, direct www.baidu.com to the local IP address to save and exit, use ettercap to start spoofing: Then let's take A look at the attacked Host: as you can see, access to the domain name www.baidu.com on the
tech.test.com. the zone configuration file [[email protected] named] # Vim tech.test.com. zone $ TTL 3600 @ in SOA tech.test.com. admin.tech.test.com. (2014080501; Serial 3 h; refresh 15 m; retry 5d; expire 1D); minimum in NS nsns in a 172.16.21.2www in a 172.16.21.22 # modify tech.test.com. the zone group is namedchgrp named tech.test.com. zone
# A problem occurs during the experiment. The DNS of the parent domain cannot always resolve the name in the subdomain. The error message is as follows
fragmentation is hard to process, and DNSSEC and IPv6 are hard to support. Two solutions are proposed. One is that although ENDS0 is expanded, there are few practical applications. The other is to encourage TCP-based DNS, but it may bring about more problems. Other problems include buffer zone poisoning, failure to know root server pollution caused by illegal gTLD and ccTLD, UDP spoofing attacks, and root key management and update problems in
Implement Postfix implementation Extmail interfaceEnvironment:Host 1:172.16.115.169 (DNS server)Host 2:172.16.115.161 (mail server)On Host 1:1. Build a DNS server Yum install-y bind1.1 Edit Master configuration vim /etc/named.conf# Listen to all IP on the machine, allow the client to queryOptions {listen-on Port : (any;};Listen-on-v6 Port 53 {:: 1;};Directory "/var/named";Dump-file "/var/named/data/cache_dump.db";Statistics-file "/var/named/data/named_stats.txt";Memstatistics-file "/var/named/d
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.