RHCE第4次作业

准备:

关闭防火墙及selinux:

 
  1. [root@master ~]# systemctl stop firewalld

  2. [root@master ~]# setenforce 0

 安装软件包(主从服务器都需要):

[root@slave ~]# yum install bind -y

该软件包服务名称为named。

配置主服务器

服务文件:

 
  1. options {

  2. listen-on port 53 { 127.0.0.1; };//监听对象IPV4地址

  3. listen-on-v6 port 53 { ::1; };//IPV6地址

  4. directory "/var/named";//数据文件主要路径

  5. dump-file "/var/named/data/cache_dump.db";//查询数据备份文件

  6. statistics-file "/var/named/data/named_stats.txt";

  7. memstatistics-file "/var/named/data/named_mem_stats.txt";

  8. secroots-file "/var/named/data/named.secroots";

  9. recursing-file "/var/named/data/named.recursing";

  10. allow-query { localhost; };//允许哪些主机发起域名查询

  11. /*

  12. - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.

  13. - If you are building a RECURSIVE (caching) DNS server, you need to enable

  14. recursion.

  15. - If your recursive DNS server has a public IP address, you MUST enable access

  16. control to limit queries to your legitimate users. Failing to do so will

  17. cause your server to become part of large scale DNS amplification

  18. attacks. Implementing BCP38 within your network would greatly

  19. reduce such attack surface

  20. */

  21. recursion yes;//是否开启递归查询

  22. dnssec-validation yes;

  23. managed-keys-directory "/var/named/dynamic";

  24. pid-file "/run/named/named.pid";

  25. session-keyfile "/run/named/session.key";

  26. include "/etc/crypto-policies/back-ends/bind.config";

  27. };

  28. logging {

  29. channel default_debug {

  30. file "data/named.run";

  31. severity dynamic;

  32. };

  33. };

  34. zone "." IN {

  35. type hint;

  36. file "named.ca";

  37. };//域

  38. include "/etc/named.rfc1912.zones";

  39. include "/etc/named.root.key";

配置服务文件并添加域(openlab.com):

 
  1. options {

  2. listen-on port 53 { 192.168.91.129; };//监听对象IPV4地址

  3. listen-on-v6 port 53 { ::1; };//IPV6地址

  4. directory "/var/named";//数据文件主要路径

  5. dump-file "/var/named/data/cache_dump.db";//查询数据备份文件

  6. statistics-file "/var/named/data/named_stats.txt";

  7. memstatistics-file "/var/named/data/named_mem_stats.txt";

  8. secroots-file "/var/named/data/named.secroots";

  9. recursing-file "/var/named/data/named.recursing";

  10. allow-query { any; };//允许哪些主机发起域名查询

  11. allow-transfer { 192.168.91.133; };//默认不存在;允许向那个服务器同步资源信息

  12. /*

  13. - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.

  14. - If you are building a RECURSIVE (caching) DNS server, you need to enable

  15. recursion.

  16. - If your recursive DNS server has a public IP address, you MUST enable access

  17. control to limit queries to your legitimate users. Failing to do so will

  18. cause your server to become part of large scale DNS amplification

  19. attacks. Implementing BCP38 within your network would greatly

  20. reduce such attack surface

  21. */

  22. recursion yes;//是否开启递归查询

  23. dnssec-validation yes;

  24. managed-keys-directory "/var/named/dynamic";

  25. pid-file "/run/named/named.pid";

  26. session-keyfile "/run/named/session.key";

  27. include "/etc/crypto-policies/back-ends/bind.config";

  28. };

  29. logging {

  30. channel default_debug {

  31. file "data/named.run";

  32. severity dynamic;

  33. };

  34. };

  35. zone "." IN {

  36. type hint;

  37. file "named.ca";

  38. };

  39. zone "openlab.com" IN {

  40. type master;

  41. file "openlab";

  42. };//添加正向域

  43. zone "91.168.192.in-addr.arpa" IN {

  44. type master;

  45. file "openlab_re";

  46. };//添加反向域

  47. include "/etc/named.rfc1912.zones";

  48. include "/etc/named.root.key";

反向域的ip是一个区段,不写主机位且反着写。

创建并添加正向资源记录文件:

[root@master ~]# vim /var/named/openlab
 
  1. $TTL 1D ;;将TTL值统一设置为1天

  2. @ IN SOA openlab.com. admin.admin.com ( 2024011600

  3. 1M

  4. 1M

  5. 3M

  6. 1D )

  7. IN NS dns.openlab.com.

  8. dns IN A 192.168.91.129

  9. www IN A 192.168.91.111

SOA资源记录类型和NA的域名要加上根域。

每行从左到右依次是:主机名        TTL(统一后就可以省略)        INTER        资源记录类型        数据。

资源记录类型
A:通过域名能够查询到对应ipv4
AAAA:通过域名能够查询到对应ipv6
CNAME:别名资源记录
PTR:指针记录Ipv4/ipv6 查询到一个域名
NS:dns解析记录类型(标记本地dns服务器的主机名)
MX:邮件解析记录类型(标记邮件服务器的主机名)

SOA:起始授权记录(主从服同步),特殊的是它有7个数据:
        masterdns        TTL        INTER        资源记录类型        数据        邮箱地址        (版本        检查时间        重试时间        失效时间        ttl)

创建并添加反向资源记录文件:

[root@master ~]# vim /var/named/openlab_re
 
  1. $TTL 1D ;;将TTL值统一设置为1天

  2. @ IN SOA openlab.com. admin.admin.com ( 2024011600

  3. 1M

  4. 1M

  5. 3M

  6. 1D )

  7. IN NS dns.openlab.com.

  8. 129 IN PTR dns.openlab.com

  9. 111 IN PTR www.openlab.com

重启服务后进行测试:

 
  1. [root@master ~]# systemctl restart named

  2. [root@master ~]# nslookup

  3. > server 192.168.91.129

  4. Default server: 192.168.91.129

  5. Address: 192.168.91.129#53

  6. > dns.openlab.com

  7. Server: 192.168.91.129

  8. Address: 192.168.91.129#53

  9. Name: dns.openlab.com

  10. Address: 192.168.91.129

  11. > www.openlab.com

  12. Server: 192.168.91.129

  13. Address: 192.168.91.129#53

  14. Name: www.openlab.com

  15. Address: 192.168.91.111

  16. > 192.168.91.129

  17. 129.91.168.192.in-addr.arpa name = dns.openlab.com.91.168.192.in-addr.arpa.

  18. > 192.168.91.111

  19. 111.91.168.192.in-addr.arpa name = www.openlab.com.91.168.192.in-addr.arpa.

nslookup:可以指定dns服务器进行域名解析。

配置从服务器

配置服务文件并添加域(openlab.com):

 
  1. options {

  2. listen-on port 53 { 192.168.91.133; };

  3. listen-on-v6 port 53 { ::1; };

  4. directory "/var/named";

  5. dump-file "/var/named/data/cache_dump.db";

  6. statistics-file "/var/named/data/named_stats.txt";

  7. memstatistics-file "/var/named/data/named_mem_stats.txt";

  8. secroots-file "/var/named/data/named.secroots";

  9. recursing-file "/var/named/data/named.recursing";

  10. allow-query { any; };

  11. /*

  12. - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.

  13. - If you are building a RECURSIVE (caching) DNS server, you need to enable

  14. recursion.

  15. - If your recursive DNS server has a public IP address, you MUST enable access

  16. control to limit queries to your legitimate users. Failing to do so will

  17. cause your server to become part of large scale DNS amplification

  18. attacks. Implementing BCP38 within your network would greatly

  19. reduce such attack surface

  20. */

  21. recursion yes;

  22. dnssec-validation yes;

  23. managed-keys-directory "/var/named/dynamic";

  24. pid-file "/run/named/named.pid";

  25. session-keyfile "/run/named/session.key";

  26. include "/etc/crypto-policies/back-ends/bind.config";

  27. };

  28. logging {

  29. channel default_debug {

  30. file "data/named.run";

  31. severity dynamic;

  32. };

  33. };

  34. zone "." IN {

  35. type hint;

  36. file "named.ca";

  37. };

  38. zone "openlab.com" IN {

  39. type slave;

  40. file "named.openlab";

  41. masters { 192.168.91.129; };

  42. };

  43. zone "91.168.192.in-addr.arpa" IN {

  44. type slave;

  45. file "named.openlab_re";

  46. masters { 192.168.91.129; };

  47. };

  48. include "/etc/named.rfc1912.zones";

  49. include "/etc/named.root.key";

不用添加资源文件,将会从主服务器同步过来:

 
  1. [root@slave ~]# ll /var/named

  2. total 36

  3. drwxrwx---. 2 named named 4096 Jan 16 21:13 data

  4. drwxrwx---. 2 named named 4096 Jan 16 21:14 dynamic

  5. -rw-r-----. 1 root named 2253 Sep 22 02:33 named.ca

  6. -rw-r-----. 1 root named 152 Sep 22 02:33 named.empty

  7. -rw-r-----. 1 root named 152 Sep 22 02:33 named.localhost

  8. -rw-r-----. 1 root named 168 Sep 22 02:33 named.loopback

  9. -rw-r--r--. 1 named named 259 Jan 16 21:13 named.openlab //正向

  10. -rw-r--r--. 1 named named 393 Jan 16 21:13 named.openlab_re //反向

  11. drwxrwx---. 2 named named 4096 Sep 22 02:33 slaves

重启服务后进行测试:

 
  1. [root@slave ~]# systemctl restart named

  2. [root@slave ~]# nslookup

  3. > server 192.168.91.133

  4. Default server: 192.168.91.133

  5. Address: 192.168.91.133#53

  6. > dns.openlab.com

  7. Server: 192.168.91.133

  8. Address: 192.168.91.133#53

  9. Name: dns.openlab.com

  10. Address: 192.168.91.129

  11. > www.openlab.com

  12. Server: 192.168.91.133

  13. Address: 192.168.91.133#53

  14. Name: www.openlab.com

  15. Address: 192.168.91.111

  16. > 192.168.91.129

  17. 129.91.168.192.in-addr.arpa name = dns.openlab.com.91.168.192.in-addr.arpa.

  18. > 192.168.91.111

  19. 111.91.168.192.in-addr.arpa name = www.openlab.com.91.168.192.in-addr.arpa.

修改资源文件尝试进行主从同步

在主服务器中添加正向解析并修改版本号为(2024011601):

ftp     IN      A       192.168.91.222

在主服务器中添加反向解析并修改版本号为(2024011601):

222     IN      PTR     ftp.openlab.com

主服务器测试:

 
  1. [root@master ~]# systemctl restart named

  2. [root@master ~]# nslookup

  3. > server 192.168.91.129

  4. Default server: 192.168.91.129

  5. Address: 192.168.91.129#53

  6. > ftp.openlab.com

  7. Server: 192.168.91.129

  8. Address: 192.168.91.129#53

  9. Name: ftp.openlab.com

  10. Address: 192.168.91.222

  11. > 192.168.91.222

  12. 222.91.168.192.in-addr.arpa name = ftp.openlab.com.91.168.192.in-addr.arpa.

因为检查时间设置为1分钟,所以我们等待1分钟后在从服务器中尝试:

 
  1. [root@slave ~]# nslookup

  2. > server 192.168.91.133

  3. Default server: 192.168.91.133

  4. Address: 192.168.91.133#53

  5. > 192.168.91.222

  6. 222.91.168.192.in-addr.arpa name = ftp.openlab.com.91.168.192.in-addr.arpa.

  7. > ftp.openlab.com

  8. Server: 192.168.91.133

  9. Address: 192.168.91.133#53

  10. Name: ftp.openlab.com

  11. Address: 192.168.91.222

   13.同步成功!

  • 7
    点赞
  • 11
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值