DNS HOWTO - A Simple Domain
DNS HOWTO - A Simple Domain
DNS HOWTO - A Simple Domain
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
5. A simple domain.
How to set up your own domain.
This is a referral. It is giving us an "Authority section" only, no "Answer section". Our own nameserver refers us to a nameserver. Pick one at random:
$ dig +norec +noques +nostats +nocmd prep.ai.mit.edu. @D.ROOT-SERVERS.NET. ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58260 ;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 3 ;; AUTHORITY SECTION: mit.edu. mit.edu. mit.edu. ;; ADDITIONAL SECTION: BITSY.mit.edu. STRAWB.mit.edu. W20NS.mit.edu. 172800 172800 172800 172800 172800 172800 IN IN IN IN IN IN NS NS NS A A A BITSY.mit.edu. STRAWB.mit.edu. W20NS.mit.edu. 18.72.0.3 18.71.0.151 18.70.0.160
This time we got a "ANSWER SECTION", and an answer for our question. The "AUTHORITY SECTION" contains information about which servers to ask about ai.mit.edu the next time. So you can ask them directly the next time you wonder about ai.mit.edu names. Named also gathered information about mit.edu, so of www.mit.edu is requested it is much closer to being able to answer the question.
1 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
So starting at . we found the successive name servers for each level in the domain name by referral. If you had used your own DNS server instead of using all those other servers, your named would of-course cache all the information it found while digging this out for you, and it would not have to ask again for a while. In the tree analogue each ``.'' in the name is a branching point. And each part between the ``.''s are the names of individual branches in the tree. One climbs the tree by taking the name we want (prep.ai.mit.edu) asking the root (.) or whatever servers father from the root toward prep.ai.mit.edu we have information about in the cache. Once the cache limits are reached the recursive resolver goes out asking servers, pursuing referrals (edges) further into the name. A much less talked about, but just as important domain is in-addr.arpa. It too is nested like the `normal' domains. in-addr.arpa allows us to get the host's name when we have its address. A important thing to note here is that the IP addresses are written in reverse order in the in-addr.arpa domain. If you have the address of a machine: 198.186.203.77 named proceeds to find the named 77.203.168.198.in-addr.arpa/ just like it did for prep.ai.mit.edu. Example: Finding no cache entry for any match but `.', ask a root server, m.root-servers.net refers you to some other root servers. b.root-servers.net refers you directly to bitsy.mit.edu/. You should be able to take it from there.
Please note the lack of `.' at the end of the domain names in this file. This says that now we will define the zone 0.0.127.in-addr.arpa, that we're the master server for it and that it is stored in a file called pz/127.0.0. We've already set up this file, it reads:
$TTL 3D @
IN
SOA
NS PTR
ns.linux.bogus. hostmaster.linux.bogus. ( 1 ; Serial 8H ; Refresh 2H ; Retry 4W ; Expire 1D) ; Minimum TTL ns.linux.bogus. localhost.
Please note the `.' at the end of all the full domain names in this file, in contrast to the named.conf file above. Some people like to start each zone file with a $ORIGIN directive, but this is superfluous. The origin (where in the DNS hierarchy it belongs) of a zone file is specified in the zone section of the named.conf file; in this case it's 0.0.127.in-addr.arpa. This `zone file' contains 3 `resource records' (RRs): A SOA RR. A NS RR and a PTR RR. SOA is short for Start Of Authority. The `@' is a special notation meaning the origin, and since the `domain' column for this file says 0.0.127.in-addr.arpa the first line really means
0.0.127.in-addr.arpa. IN SOA ...
NS is the Name Server RR. There is no '@' at the start of this line; it is implicit since the previous line started with a '@'. Saves some typing that. So the NS line could also be written
0.0.127.in-addr.arpa. IN NS ns.linux.bogus
It tells DNS what machine is the name server of the domain 0.0.127.in-addr.arpa, it is ns.linux.bogus. 'ns' is a customary name for name-servers, but as with web servers who are customarily named www.something. The name may be anything. And finally the PTR (Domain Name Pointer) record says that the host at address 1 in the subnet 0.0.127.in-addr.arpa, i.e., 127.0.0.1 is named localhost. The SOA record is the preamble to all zone files, and there should be exactly one in each zone file, at the top (but after the $TTL directive). It describes the zone, where it comes from (a machine called ns.linux.bogus), who is responsible for its contents (hostmaster@linux.bogus; you should insert your e-mail address here), what version of the zone file this is (serial: 1), and other things having to do with caching and secondary DNS servers. For the rest of the fields (refresh, retry, expire and minimum) use the numbers used in this HOWTO and you should be safe. Before the SOA comes a mandatory line, the $TTL 3D line. Put it in all your zone files. Now restart your named (rndc stop; named) and use dig to examine your handy work. -x asks for the inverse query:
$ dig -x 127.0.0.1 ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30944 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;1.0.0.127.in-addr.arpa. ;; ANSWER SECTION: 1.0.0.127.in-addr.arpa. 259200 ;; AUTHORITY SECTION: IN IN PTR PTR localhost.
2 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
0.0.127.in-addr.arpa. ;; ;; ;; ;;
259200
IN
NS
ns.linux.bogus.
Query time: 3 msec SERVER: 127.0.0.1#53(127.0.0.1) WHEN: Sun Dec 23 03:02:39 2001 MSG SIZE rcvd: 91
So it manages to get localhost from 127.0.0.1, good. Now for our main task, the linux.bogus domain, insert a new 'zone' section in named.conf:
zone "linux.bogus" { type master; notify no; file "pz/linux.bogus"; };
Note again the lack of ending `.' on the domain name in the named.conf file. In the linux.bogus zone file we'll put some totally bogus data:
; ; Zone file for linux.bogus ; ; The full zone file ; $TTL 3D @ IN SOA ns.linux.bogus. hostmaster.linux.bogus. ( 199802151 ; serial, todays date + todays serial # 8H ; refresh, seconds 2H ; retry, seconds 4W ; expire, seconds 1D ) ; minimum, seconds ; NS ns ; Inet Address of name server MX 10 mail.linux.bogus ; Primary Mail Exchanger MX 20 mail.friend.bogus. ; Secondary Mail Exchanger ; localhost A 127.0.0.1 ns A 192.168.196.2 mail A 192.168.196.4
Two things must be noted about the SOA record. ns.linux.bogus must be a actual machine with a A record. It is not legal to have a CNAME record for the machine mentioned in the SOA record. Its name need not be `ns', it could be any legal host name. Next, hostmaster.linux.bogus should be read as hostmaster@linux.bogus. This should be a mail alias, or a mailbox, where the person(s) maintaining DNS should read mail frequently. Any mail regarding the domain will be sent to the address listed here. The name need not be `hostmaster', it can be your normal e-mail address, but the e-mail address `hostmaster' is often expected to work as well. There is one new RR type in this file, the MX, or Mail eXchanger RR. It tells mail systems where to send mail that is addressed to someone@linux.bogus, namely to The number before each machine name is that MX RR's priority. The RR with the lowest number (10) is the one mail should be sent to if possible. If that fails the mail can be sent to one with a higher number, a secondary mail handler, i.e., mail.friend.bogus which has priority 20 here.
mail.linux.bogus or mail.friend.bogus.
Reload named by running rndc reload. Examine the results with dig:
$ dig any linux.bogus ; <<>> DiG 9.1.3 <<>> any linux.bogus ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55239 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;linux.bogus. IN ANY
;; ANSWER SECTION: linux.bogus. 259200 IN SOA ns.linux.bogus. \ hostmaster.linux.bogus. 199802151 28800 7200 2419200 86400 linux.bogus. 259200 IN NS ns.linux.bogus. linux.bogus. 259200 IN MX 20 mail.friend.bogus. linux.bogus. 259200 IN MX 10 mail.linux.bogus.linux.bogus. ;; AUTHORITY SECTION: linux.bogus. 259200 ;; ADDITIONAL SECTION: ns.linux.bogus. 259200 ;; ;; ;; ;; IN IN NS A ns.linux.bogus. 192.168.196.2
Query time: 4 msec SERVER: 127.0.0.1#53(127.0.0.1) WHEN: Sun Dec 23 03:06:45 2001 MSG SIZE rcvd: 184
I deliberately made a mistake so you could learn from it :-) Looking in the zone file we find this line:
3 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
MX
10 mail.linux.bogus
It is missing a period. Or has a 'linux.bogus' too many. If a machine name does not end in a period in a zone file the origin is added to its end causing the double linux.bogus.linux.bogus. So either
MX 10 mail.linux.bogus. ; Primary Mail Exchanger
or
MX 10 mail ; Primary Mail Exchanger
is correct. I prefer the latter form, it's less to type. There are some BIND experts that disagree, and some that agree with this. In a zone file the domain should either be written out and ended with a `.' or it should not be included at all, in which case it defaults to the origin. I must stress that in the named.conf file there should not be `.'s after the domain names. You have no idea how many times a `.' too many or few have fouled up things and confused the h*ll out of people. So having made my point here is the new zone file, with some extra information in it as well:
; ; Zone file for linux.bogus ; ; The full zone file ; $TTL 3D @ IN SOA ns.linux.bogus. hostmaster.linux.bogus. ( 199802151 ; serial, todays date + todays serial # 8H ; refresh, seconds 2H ; retry, seconds 4W ; expire, seconds 1D ) ; minimum, seconds ; TXT "Linux.Bogus, your DNS consultants" NS ns ; Inet Address of name server NS ns.friend.bogus. MX 10 mail ; Primary Mail Exchanger MX 20 mail.friend.bogus. ; Secondary Mail Exchanger localhost gw ns www donald A A TXT A MX MX CNAME A MX MX TXT A MX MX A MX MX 127.0.0.1 192.168.196.1 "The router" 192.168.196.2 10 mail 20 mail.friend.bogus. ns 192.168.196.3 10 mail 20 mail.friend.bogus. "DEK" 192.168.196.4 10 mail 20 mail.friend.bogus. 192.168.196.5 10 mail 20 mail.friend.bogus.
ftp
CNAME (Canonical NAME) is a way to give each machine several names. So www is an alias for ns. CNAME record usage is a bit controversial. But it's safe to follow the rule that a MX, CNAME or SOA record should never refer to a CNAME record, they should only refer to something with an A record, so it is inadvisable to have
foobar CNAME www ; NO!
Load the new database by running rndc reload, which causes named to read its files again.
$ dig linux.bogus axfr ; <<>> DiG 9.1.3 <<>> linux.bogus axfr ;; global options: printcmd linux.bogus. 259200 IN linux.bogus. 259200 IN linux.bogus. 259200 IN linux.bogus. 259200 IN donald.linux.bogus. 259200 IN donald.linux.bogus. 259200 IN donald.linux.bogus. 259200 IN
SOA NS MX MX A MX MX
ns.linux.bogus. hostmaster.linux.bogus. 199802151 28800 7200 2419200 86400 ns.linux.bogus. 10 mail.linux.bogus. 20 mail.friend.bogus. 192.168.196.3 10 mail.linux.bogus. 20 mail.friend.bogus.
4 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
donald.linux.bogus. 259200 IN ftp.linux.bogus. 259200 IN ftp.linux.bogus. 259200 IN ftp.linux.bogus. 259200 IN gw.linux.bogus. 259200 IN gw.linux.bogus. 259200 IN localhost.linux.bogus. 259200 IN mail.linux.bogus. 259200 IN mail.linux.bogus. 259200 IN mail.linux.bogus. 259200 IN ns.linux.bogus. 259200 IN ns.linux.bogus. 259200 IN ns.linux.bogus. 259200 IN www.linux.bogus. 259200 IN linux.bogus. 259200 IN ;; Query time: 41 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Sun Dec 23 03:12:31 2001 ;; XFR size: 23 records
"DEK" 192.168.196.5 10 mail.linux.bogus. 20 mail.friend.bogus. 192.168.196.1 "The router" 127.0.0.1 192.168.196.4 10 mail.linux.bogus. 20 mail.friend.bogus. 10 mail.linux.bogus. 20 mail.friend.bogus. 192.168.196.2 ns.linux.bogus. ns.linux.bogus. hostmaster.linux.bogus. 199802151 28800 7200 2419200 86400
That's good. As you see it looks a bit like the zone file itself. Let's check what it says for www alone:
$ dig www.linux.bogus ; <<>> DiG 9.1.3 <<>> www.linux.bogus ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16633 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;www.linux.bogus. ;; ANSWER SECTION: www.linux.bogus. ns.linux.bogus. ;; AUTHORITY SECTION: linux.bogus. ;; ;; ;; ;; 259200 259200 259200 IN IN IN IN A CNAME A NS ns.linux.bogus. 192.168.196.2 ns.linux.bogus.
Query time: 5 msec SERVER: 127.0.0.1#53(127.0.0.1) WHEN: Sun Dec 23 03:14:14 2001 MSG SIZE rcvd: 80
In other words, the real name of www.linux.bogus is ns.linux.bogus, and it gives you some of the information it has about ns as well, enough to connect to it if you were a program. Now we're halfway.
This is exactly as with the 0.0.127.in-addr.arpa, and the contents are similar:
$TTL 3D @ IN
SOA
ns.linux.bogus. hostmaster.linux.bogus. ( 199802151 ; Serial, todays date + todays serial 8H ; Refresh 2H ; Retry 4W ; Expire 1D) ; Minimum TTL ns.linux.bogus. gw.linux.bogus. ns.linux.bogus. donald.linux.bogus. mail.linux.bogus. ftp.linux.bogus.
Now you reload your named (rndc reload) and examine your work with dig again:
$ dig -x 192.168.196.4 ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58451 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;4.196.168.192.in-addr.arpa. IN PTR
5 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
;; ANSWER SECTION: 4.196.168.192.in-addr.arpa. 259200 IN ;; AUTHORITY SECTION: 196.168.192.in-addr.arpa. 259200 IN ;; ADDITIONAL SECTION: ns.linux.bogus. ;; ;; ;; ;; 259200 IN
PTR NS A
Query time: 4 msec SERVER: 127.0.0.1#53(127.0.0.1) WHEN: Sun Dec 23 03:16:05 2001 MSG SIZE rcvd: 107
so, it looks OK, dump the whole thing to examine that too:
$ dig 196.168.192.in-addr.arpa. AXFR ; <<>> DiG 9.1.3 <<>> 196.168.192.in-addr.arpa. ;; global options: printcmd 196.168.192.in-addr.arpa. 259200 IN SOA hostmaster.linux.bogus. 199802151 28800 196.168.192.in-addr.arpa. 259200 IN NS 1.196.168.192.in-addr.arpa. 259200 IN PTR 2.196.168.192.in-addr.arpa. 259200 IN PTR 3.196.168.192.in-addr.arpa. 259200 IN PTR 4.196.168.192.in-addr.arpa. 259200 IN PTR 5.196.168.192.in-addr.arpa. 259200 IN PTR 196.168.192.in-addr.arpa. 259200 IN SOA hostmaster.linux.bogus. 199802151 28800 ;; Query time: 6 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Sun Dec 23 03:16:58 2001 ;; XFR size: 9 records AXFR ns.linux.bogus. \ 7200 2419200 86400 ns.linux.bogus. gw.linux.bogus. ns.linux.bogus. donald.linux.bogus. mail.linux.bogus. ftp.linux.bogus. ns.linux.bogus. \ 7200 2419200 86400
Looks good! If your output didn't look like that look for error-messages in your syslog, I explained how to do that in the first section under the heading Starting named
6 of 7
23-12-2003 1:34
http://www.tldp.org/HOWTO/DNS-HOWTO-5.html
classless reverse zone as described by Mr. DNS. There is another trap lurking here. (Very) Old resolvers will not be able to follow the CNAME trick in the resolving chain and will fail to reverse-resolve your machine. This can result in the service assigning it an incorrect access class, deny access or something along those lines. If you stumble into such a service the only solution (that I know of) is for your ISP to insert your PTR record directly into their trick classless zone file instead of the trick CNAME record. Some ISPs will offer other ways to handle this, like Web based forms for you to input your reverse-mappings in or other automagical systems.
A mechanism called zone-transfer is used to copy the data. The zone transfer is controlled by your SOA record:
@ IN SOA ns.linux.bogus. 199802151 8H 2H 4W 1D ) hostmaster.linux.bogus. ( ; serial, todays date + todays serial # ; refresh, seconds ; retry, seconds ; expire, seconds ; minimum, seconds
A zone is only transferred if the serial number on the master is larger than on the slave. Every refresh interval the slave will check if the master has been updated. If the check fails (because the master is unavailable) it will retry the check every retry interval. If it continues to fail as long as the expire interval the slave will remove the zone from it's filesystem and no longer be a server for it. Next Previous Contents
7 of 7
23-12-2003 1:34