Project

General

Profile

Bind » History » Version 5

Koaps Freeman, 03/26/2012 12:30 AM

1 1 Ohad Levy
h1. Bind
2
3 4 Ohad Levy
Bind configuration manipulation is based on nsupdate, which means that in theory could also be used to manipulate other dns servers which support nsupdate (such as Microsoft DNS server).
4 1 Ohad Levy
5
h3. Configuration
6
7 4 Ohad Levy
In order to communicate securely with your dns server, you would need a key which will be used by nsupdate and your named daemon using ddns-confgen or dnssec-keygen
8 3 Ohad Levy
9 4 Ohad Levy
h4. example using ddns-confgen
10 1 Ohad Levy
11 5 Koaps Freeman
execute 'ddns-confgen -k foreman -a hmac-md5' - this should output something like the following:
12 1 Ohad Levy
<pre>
13
# To activate this key, place the following in named.conf, and
14
# in a separate keyfile on the system or systems from which nsupdate
15
# will be run:
16
key "foreman" {
17 5 Koaps Freeman
        algorithm hmac-md5;
18
        secret "GGd1oNCxaKsh8HA84sP1Ug==";
19 1 Ohad Levy
};
20
21
# Then, in the "zone" statement for each zone you wish to dynamically
22
# update, place an "update-policy" statement granting update permission
23
# to this key.  For example, the following statement grants this key
24
# permission to update any name within the zone:
25
update-policy {
26 5 Koaps Freeman
        grant foreman zonesub ANY;
27 1 Ohad Levy
};
28
29 5 Koaps Freeman
# After the keyfile has been placed, the following command will
30
# execute nsupdate using this key:
31
nsupdate -k <keyfile>
32 1 Ohad Levy
</pre>
33
34
You should create a new file (such as /etc/rndc.key or other) and store the key "foreman {...} in it.
35
in the proxy Settings file you should point to this file location - make sure that the proxy have read permissions to this file.
36
37
In your named file, you could add the update-policy statement or something like this [[named example file]] if you need more fine grained permissions.