} interval#slave从master更新失败的重试间隔#在无法联系master的情况下多久slave停止服务3600) #对否定回答的缓存时间In NS dns1.long.com. #指定本域中权威DNS服务器In NS dns2.long.com. #让主域知道还有个从域Dns1 in NS 192.168.1.1Dns2 in NS 192.168.1.2 #假设从域的IP地址是192.168.1.2Liu in A 192.168.1.10Test in A 192.168.1.15Save, edit the primary domain's master profile/etc/named.confRun Command vim/etc/named.confFind the two dnssec-enables and dnssec-validation, change Yes to N
configuration, with the user location changes, automatically switch to different firewall configuration.
6, DNSSEC support: Enhanced domain name Resolution Protocol standards, the old DNS is risky, so added to the DNS enhanced version of the DNSSEC support.
7. NAP Network Rights protection: This is the feature introduced in Vista, continue to inherit. The computer can be tested for health.
8, DirectAcce
running
Add named to the startup entry and start with the operating system.echo "/usr/local/named/sbin/named-c/usr/local/named/etc/named.conf" >>/etc/rc.local
############ #从dns配置Compile installation, generate rndc.conf, and named.conf and master library operations
VI Named.conf added at the backOptions {Version "Guess";Allow-transfer {none;};Directory "/USR/LOCAL/NAMED/ETC";Dump-file "/usr/local/named/var/cache_dump.db";Statistics-file "/usr/local/named/var/named_stats.txt";Memstatistics-fi
: 192.168.80.0/25, the IP used by Unicom customers is: 192.168.80.128/25.PS: It is recommended to initialize a clean environment when doing experiments. (Recommended after DNS restart is configured.)
2. Delete the master profile root zone definition, because implementing smart Domain name resolution requires that all zones be added to the view--vi /etc/named.conf[named.conf]#删除此部分(注意“listen-on port 53”、“allow-query”、“dnssec-enable”、“
Vulnerability Update Time:Vulnerability causeDesign ErrorHazard levelLowImpact SystemDebian bind 9Unaffected SystemHazardsRemote attackers can exploit this vulnerability to stop the BIND service program from responding.Attack ConditionsAttackers must access isc bind.Vulnerability InformationIsc bind is a DNS protocol implementation.When processing domain updates, an authoritative server has a race condition error. Attackers can trigger this vulnerability through dynamic DNS updates or incrementa
Linux 9.0 As the DDNS Server and runs the DNS and DHCP services at the same time. The DNS Server uses Bind 9.2.2, And the DHCP Server uses the DHCP Server v3.0pl2.
The following describes how to implement secure and Dynamic DNS in Linux.
Create a key
To achieve dynamic DNS updates, you must first consider how to ensure secure implementation of DDNS. The method provided by ISC is to create a key for dynamic updates, which is used for verification during updates. To implement this function, run
virtual machines to simulate DNS spoofing attacks.
The tool used is Ettercap.
First, let's look at the Target target,
Obviously, the IP address directed to www.baidu.com is correct. Then we use ettercap to perform DNS Spoofing. First, find etter. dns configuration file and edit and add A record, direct www.baidu.com to the local IP address to save and exit, use ettercap to start spoofing: Then let's take A look at the attacked Host: as you can see, access to the domain name www.baidu.com on the
tech.test.com. the zone configuration file [[email protected] named] # Vim tech.test.com. zone $ TTL 3600 @ in SOA tech.test.com. admin.tech.test.com. (2014080501; Serial 3 h; refresh 15 m; retry 5d; expire 1D); minimum in NS nsns in a 172.16.21.2www in a 172.16.21.22 # modify tech.test.com. the zone group is namedchgrp named tech.test.com. zone
# A problem occurs during the experiment. The DNS of the parent domain cannot always resolve the name in the subdomain. The error message is as follows
fragmentation is hard to process, and DNSSEC and IPv6 are hard to support. Two solutions are proposed. One is that although ENDS0 is expanded, there are few practical applications. The other is to encourage TCP-based DNS, but it may bring about more problems. Other problems include buffer zone poisoning, failure to know root server pollution caused by illegal gTLD and ccTLD, UDP spoofing attacks, and root key management and update problems in
Implement Postfix implementation Extmail interfaceEnvironment:Host 1:172.16.115.169 (DNS server)Host 2:172.16.115.161 (mail server)On Host 1:1. Build a DNS server Yum install-y bind1.1 Edit Master configuration vim /etc/named.conf# Listen to all IP on the machine, allow the client to queryOptions {listen-on Port : (any;};Listen-on-v6 Port 53 {:: 1;};Directory "/var/named";Dump-file "/var/named/data/cache_dump.db";Statistics-file "/var/named/data/named_stats.txt";Memstatistics-file "/var/named/d
the name of the TSIG password, and key indicates the actual password. The password is a 64-bit encrypted string, usually generated by dnssec-keygen (8. Exercise caution when using option-y on a multi-user system, because the password may be visible in ps (1) output or shell history documents. When both dig and TSCG are used for authentication, the queried name server needs to know the password and decoding rules. In BIND, provide the correct password
the TSIG password, and key is the actual password. The password is a 64-bit cryptographic string, usually generated by Dnssec-keygen (8). Caution should be exercised when using option-Y on multi-user systems, because the password may be visible in the output of PS (1) or in the Shell's history file. When using both dig and TSCG authentication, the queried name server needs to know the password and decoding rules. In BIND, the implementation is implem
server to find the operator, the discovery of a cache will be directly from the cache to return the answer, improve resolution efficiency.Note: the forwarded server needs to be able to do recursion for the requestor, otherwise, the forwarding request will not proceed;(1) All forwarding: all the non-native all responsible for the resolution of the area of the request, all forwarded to the designated server;options{forward{first|only} fowwarders}First: Forward, if there is no answer to the root o
address, so only local use is allowed;After the BIND program is installed, the cache name server can be used by default, and the service can be started directly if there is no specific area for parsing.CentOS 6:service named startCentOS 7:systemctl Start Named.serviceMaster configuration file Format:Global Configuration segment:Options {...}Log configuration section:Logging {...}Zone Configuration segment:Zone {...}Those areas that are parsed by the local machine, or the area that is forwarded;
"/var/named";Dump-file "/var/named/data/cache_dump.db";Statistics-file "/var/named/data/named_stats.txt";Memstatistics-file "/var/named/data/named_mem_stats.txt";allow-query {localhost;};Recursion Yes,------------------------the main configuration is commented out here, we specify it separately in the viewDnssec-enable Yes;Dnssec-validation Yes;Dnssec-lookaside Auto;/* Path to ISC DLV key */Bindkeys-file "
, automatically switch to different firewall configuration.
6, DNSSEC support: Enhanced domain name Resolution Protocol standards, the old DNS is risky, so added to the DNS enhanced version of the DNSSEC support.
7. NAP Network Rights protection: This is the feature introduced in Vista, continue to inherit. The computer can be tested for health.
8, DirectAccess safe and seamless connection with the compa
realize the dynamic update of DNS, the first thing to consider is how to ensure the implementation of DDNS safely. The approach given by ISC is to create a key that is dynamically updated and validated by the key when it is updated. To achieve this, you need to run the following command as root:
root@slack9:/etc# dnssec-keygen-a hmac-md5-b 128-n USER Myddns
kmyddns.+157+37662
The function of the above Dnssec
Install the DNS package:
Yum install-y bind
To Configure the DNS master configuration file:
Configuration files:/etc/named.conf,named.rfc1912.zones,
Parse Library file:/var/named/
1. vi/etc/named.conf
Listen-on Port 53 {192.168.1.10;};
To turn off the security features of DNS without affecting the local parsing feature:Dnssec-enable No;Dnssec-validation No;Dnssec-lookaside No;
2. Check the configuration f
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.