Hacked By AnonymousFox
| Current Path : /etc/ |
|
|
| Current File : //etc/named.conf,v |
head 1.8;
access;
symbols;
locks
root:1.8; strict;
comment @# @;
1.8
date 2018.05.03.02.08.12; author root; state Exp;
branches;
next 1.7;
1.7
date 2018.04.16.07.45.33; author root; state Exp;
branches;
next 1.6;
1.6
date 2018.04.16.07.45.33; author root; state Exp;
branches;
next 1.5;
1.5
date 2018.03.27.02.05.03; author root; state Exp;
branches;
next 1.4;
1.4
date 2018.03.20.03.05.21; author root; state Exp;
branches;
next 1.3;
1.3
date 2018.03.08.03.05.06; author root; state Exp;
branches;
next 1.2;
1.2
date 2018.02.12.20.34.26; author root; state Exp;
branches;
next 1.1;
1.1
date 2018.02.12.20.34.18; author root; state Exp;
branches;
next ;
desc
@@
1.8
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@include "/etc/rndc.key";
controls {
inet 127.0.0.1 allow { localhost; } keys { "rndc-key"; };
};
options {
/* make named use port 53 for the source of all queries, to allow
* firewalls to block all ports except 53:
*/
// query-source port 53;
recursion no;
/* We no longer enable this by default as the dns posion exploit
has forced many providers to open up their firewalls a bit */
// Put files that named is allowed to write in the data/ directory:
directory "/var/named"; // the default
pid-file "/var/run/named/named.pid";
dump-file "data/cache_dump.db";
statistics-file "data/named_stats.txt";
/* memstatistics-file "data/named_mem_stats.txt"; */
allow-transfer { "none"; };
};
logging {
channel default_log {
file "/var/log/named/named.log" versions 5 size 128M;
print-time yes;
print-severity yes;
print-category yes;
severity warning;
};
category default { default_log; };
category general { default_log; };
};
// All BIND 9 zones are in a "view", which allow different zones to be served
// to different types of client addresses, and for options to be set for groups
// of zones.
//
// By default, if named.conf contains no "view" clauses, all zones are in the
// "default" view, which matches all clients.
//
// If named.conf contains any "view" clause, then all zones MUST be in a view;
// so it is recommended to start off using views to avoid having to restructure
// your configuration files in the future.
view "localhost_resolver" {
/* This view sets up named to be a localhost resolver ( caching only nameserver ).
* If all you want is a caching-only nameserver, then you need only define this view:
*/
match-clients { 127.0.0.0/24; };
match-destinations { localhost; };
recursion yes;
zone "." IN {
type hint;
file "/var/named/named.ca";
};
/* these are zones that contain definitions for all the localhost
* names and addresses, as recommended in RFC1912 - these names should
* ONLY be served to localhost clients:
*/
include "/var/named/named.rfc1912.zones";
};
view "internal" {
/* This view will contain zones you want to serve only to "internal" clients
that connect via your directly attached LAN interfaces - "localnets" .
*/
match-clients { localnets; };
match-destinations { localnets; };
recursion yes;
zone "." IN {
type hint;
file "/var/named/named.ca";
};
// include "/var/named/named.rfc1912.zones";
// you should not serve your rfc1912 names to non-localhost clients.
// These are your "authoritative" internal zones, and would probably
// also be included in the "localhost_resolver" view above :
zone "totalcloud.fr" {
type master;
file "/var/named/totalcloud.fr.db";
};
zone "tcleas.fr" {
type master;
file "/var/named/tcleas.fr.db";
};
zone "sebtest.com" {
type master;
file "/var/named/sebtest.com.db";
};
zone "l-chiffre.com" {
type master;
file "/var/named/l-chiffre.com.db";
};
zone "mydepannage.fr" {
type master;
file "/var/named/mydepannage.fr.db";
};
zone "publicite-albi.com" {
type master;
file "/var/named/publicite-albi.com.db";
};
zone "almacar.fr" {
type master;
file "/var/named/almacar.fr.db";
};
zone "totalcloud.info" {
type master;
file "/var/named/totalcloud.info.db";
};
zone "digital-led-media.fr" {
type master;
file "/var/named/digital-led-media.fr.db";
};
zone "ouicharge.fr" {
type master;
file "/var/named/ouicharge.fr.db";
};
zone "happy-baby-box.fr" {
type master;
file "/var/named/happy-baby-box.fr.db";
};
zone "3dnova.fr" {
type master;
file "/var/named/3dnova.fr.db";
};
zone "lr-performance.net" {
type master;
file "/var/named/lr-performance.net.db";
};
zone "eybenssportauto.com" {
type master;
file "/var/named/eybenssportauto.com.db";
};
};
view "external" {
/* This view will contain zones you want to serve only to "external" clients
* that have addresses that are not on your directly attached LAN interface subnets:
*/
recursion no;
additional-from-cache no;
// you'd probably want to deny recursion to external clients, so you don't
// end up providing free DNS service to all takers
// all views must contain the root hints zone:
zone "." IN {
type hint;
file "/var/named/named.ca";
};
// These are your "authoritative" external zones, and would probably
// contain entries for just your web and mail servers:
// BEGIN external zone entries
zone "totalcloud.fr" {
type master;
file "/var/named/totalcloud.fr.db";
};
zone "tcleas.fr" {
type master;
file "/var/named/tcleas.fr.db";
};
zone "sebtest.com" {
type master;
file "/var/named/sebtest.com.db";
};
zone "l-chiffre.com" {
type master;
file "/var/named/l-chiffre.com.db";
};
zone "mydepannage.fr" {
type master;
file "/var/named/mydepannage.fr.db";
};
zone "publicite-albi.com" {
type master;
file "/var/named/publicite-albi.com.db";
};
zone "almacar.fr" {
type master;
file "/var/named/almacar.fr.db";
};
zone "totalcloud.info" {
type master;
file "/var/named/totalcloud.info.db";
};
zone "digital-led-media.fr" {
type master;
file "/var/named/digital-led-media.fr.db";
};
zone "ouicharge.fr" {
type master;
file "/var/named/ouicharge.fr.db";
};
zone "happy-baby-box.fr" {
type master;
file "/var/named/happy-baby-box.fr.db";
};
zone "3dnova.fr" {
type master;
file "/var/named/3dnova.fr.db";
};
zone "lr-performance.net" {
type master;
file "/var/named/lr-performance.net.db";
};
zone "eybenssportauto.com" {
type master;
file "/var/named/eybenssportauto.com.db";
};
};
@
1.7
log
@"Modified by /usr/local/cpanel/scripts/cleandns cleandns END"
@
text
@d145 22
d242 22
@
1.6
log
@"Modified by /usr/local/cpanel/scripts/cleandns cleandns BEGIN"
@
text
@a94 3
a99 1
a104 1
a109 1
a114 1
a119 1
a124 1
a129 1
a134 1
a139 1
a166 1
a171 3
a176 1
a181 1
a186 1
a191 1
a196 1
a201 1
a206 1
a211 1
a216 1
d223 1
@
1.5
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@a95 4
zone "totalcloudtest.com" {
type master;
file "/var/named/totalcloudtest.com.db";
};
d127 30
a185 4
zone "totalcloudtest.com" {
type master;
file "/var/named/totalcloudtest.com.db";
};
d215 30
@
1.4
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@d119 12
d181 12
@
1.3
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@d113 6
d163 6
@
1.2
log
@"Modified by /usr/local/cpanel/scripts/fixrndc Initial checkin from /usr/local/cpanel/scripts/fixrndc"
@
text
@d89 24
d134 24
@
1.1
log
@"Modified by /usr/local/cpanel/scripts/rebuilddnsconfig rebuilddnsconfig END"
@
text
@d1 6
@
Hacked By AnonymousFox1.0, Coded By AnonymousFox