Estoy ejecutando un servidor Arch Linux Bind, y estoy tratando de lograr un dominio de desarrollo pseudo local llamado ld.pvt para que desde mis otras máquinas tenga acceso web a los servidores web en la máquina Bind.
¿Dónde me estoy confundiendo es dónde mapeo mis máquinas LAN? es decir, todos los demás, la máquina de desarrollo, la impresora, etc. ¿Para eso sirve Bind, o deberían simplemente ir a / etc / hosts?
/ etc / hosts
#<ip-address> <hostname.domain.org> <hostname>
127.0.0.1 falcon.ld.pvt falcon localhost
#ipv6 support
::1 falcon.ld.pvt localhost
#localhost.localdomain
192.168.1.99 redtail.ld.pvt redtail
192.168.1.150 osprey.pd.pvt osprey
192.168.1.254 router.pd.pvt router gateway
archivo de zona
$ cat /var/named/ld.pvt.zone
$TTL 7200
; ld.pvt
@ IN SOA falcon.ld.pvt. postmaster.ld.pvt. (
200701171 ; Serial
3H ; Refresh
15M ; Retry
1W ; Expire - 1 week
1D ) ; Minimum
IN NS falcon.ld.pvt.
IN MX 10 mail.ld.pvt
falcon IN A 192.168.1.10
redtail IN A 192.168.1.99
imap IN CNAME falcon
smtp IN CNAME falcon
mail IN CNAME falcon
www IN CNAME falcon
;*wildcard is bad because you then cant use multiple hosts since oyou wildcarded everything in bulk to falcon alone, for e.g.
;*.ld.pvt IN CNAME falcon
; * IN CNAME falcon
named.conf
$ cat /etc/named.conf
// vim:set ts=4 sw=4 et:
acl "local" {
127.0.0.0/8;
};
acl "wolfnet" {
192.168.1.0/24;
};
acl "trusted" {
"local";
"wolfnet";
};
acl "forwarders" {
8.8.4.4;
8.8.8.8;
};
options {
directory "/var/named";
pid-file "/run/named/named.pid";
dnssec-validation auto;
listen-on-v6 { any; };
listen-on { "trusted"; };
interface-interval 101;
allow-recursion { "trusted"; };
recursion yes;
allow-query { trusted; };
allow-transfer { none; };
allow-update { none; };
forward only;
forwarders { "forwarders"; };
query-source address * port 53;
transfer-source address * port 53;
notify-source address * port 53;
query-source-v6 address * port 53;
version none;
hostname none;
server-id none;
};
logging {
channel default_file {
file "/var/log/named/default.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel general_file {
file "/var/log/named/general.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel database_file {
file "/var/log/named/database.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel security_file {
file "/var/log/named/security.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel config_file {
file "/var/log/named/config.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel resolver_file {
file "/var/log/named/resolver.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel xfer-in_file {
file "/var/log/named/xfer-in.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel xfer-out_file {
file "/var/log/named/xfer-out.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel notify_file {
file "/var/log/named/notify.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel client_file {
file "/var/log/named/client.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel unmatched_file {
file "/var/log/named/unmatched.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel queries_file {
file "/var/log/named/queries.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel network_file {
file "/var/log/named/network.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel update_file {
file "/var/log/named/update.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel dispatch_file {
file "/var/log/named/dispatch.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel dnssec_file {
file "/var/log/named/dnssec.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
channel lame-servers_file {
file "/var/log/named/lame-servers.log" versions 3 size 5m;
severity dynamic;
print-time yes;
};
category default { default_file; };
category general { general_file; };
category database { database_file; };
category security { security_file; };
category config { config_file; };
category resolver { resolver_file; };
category xfer-in { xfer-in_file; };
category xfer-out { xfer-out_file; };
category notify { notify_file; };
category client { client_file; };
category unmatched { unmatched_file; };
category queries { queries_file; };
category network { network_file; };
category update { update_file; };
category dispatch { dispatch_file; };
category dnssec { dnssec_file; };
category lame-servers { lame-servers_file; };
};
zone "ld.pvt" IN {
type master;
file "ld.pvt.zone";
allow-update { none; };
notify no;
};
view "trusted" {
match-clients { trusted; };
zone "ld.pvt" {
type master;
file "ld.pvt.zone";
};
};
zone "1.168.192.in-addr.arpa" IN {
type master;
file "1.168.192..zone";
allow-update { none; };
};
Iptables
$ iptables --list
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere
DROP all -- anywhere anywhere ctstate INVALID
ACCEPT icmp -- anywhere anywhere icmp echo-request ctstate NEW
UDP udp -- anywhere anywhere ctstate NEW
TCP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN ctstate NEW
REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable
REJECT tcp -- anywhere anywhere reject-with tcp-reset
REJECT all -- anywhere anywhere reject-with icmp-proto-unreachable
Chain FORWARD (policy DROP)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain IN_SSH (1 references)
target prot opt source destination
DROP all -- anywhere anywhere recent: CHECK seconds: 10 hit_count: 3 TTL-Match name: sshbf side: source mask: 255.255.255.255
DROP all -- anywhere anywhere recent: CHECK seconds: 1800 hit_count: 4 TTL-Match name: sshbf side: source mask: 255.255.255.255
ACCEPT all -- anywhere anywhere recent: SET name: sshbf side: source mask: 255.255.255.255
Chain TCP (1 references)
target prot opt source destination
DROP tcp -- anywhere anywhere tcp dpt:http STRING match "GET /w00tw00t.at.ISC.SANS." ALGO name bm TO 65535
ACCEPT tcp -- anywhere anywhere tcp dpt:22
ACCEPT tcp -- anywhere anywhere tcp dpt:http
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT tcp -- anywhere anywhere tcp dpts:hbci:cgms
ACCEPT tcp -- anywhere anywhere tcp dpt:35729
ACCEPT tcp -- anywhere anywhere tcp dpt:mysql
ACCEPT tcp -- anywhere anywhere tcp dpt:27017
ACCEPT tcp -- anywhere anywhere tcp dpt:953
ACCEPT tcp -- anywhere anywhere tcp dpt:netbios-ssn
ACCEPT tcp -- anywhere anywhere tcp dpt:microsoft-ds
IN_SSH tcp -- anywhere anywhere tcp dpt:22
Chain UDP (1 references)
target prot opt source destination
ACCEPT udp -- anywhere anywhere udp dpt:27017
ACCEPT udp -- anywhere anywhere udp dpt:domain
ACCEPT udp -- anywhere anywhere udp dpts:netbios-ns:netbios-dgm
ACCEPT udp -- anywhere anywhere udp dpt:microsoft-ds
Desde una máquina de desarrollo en el LAN, el enrutamiento a través de la puerta de enlace de .254 siempre muestra esto, sin acceso:
Editar:
Además, tenga en cuenta que creo que tengo un gran problema, abrí el puerto 953, no el 53, ¿qué debo cambiar?