<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="pt-BR">
	<id>https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=Configura%C3%A7%C3%A3o_do_BIND_%2F_NAMED_no_Centos7</id>
	<title>Configuração do BIND / NAMED no Centos7 - Histórico de revisão</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ourominas.com.br/index.php?action=history&amp;feed=atom&amp;title=Configura%C3%A7%C3%A3o_do_BIND_%2F_NAMED_no_Centos7"/>
	<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Configura%C3%A7%C3%A3o_do_BIND_/_NAMED_no_Centos7&amp;action=history"/>
	<updated>2026-04-17T11:24:42Z</updated>
	<subtitle>Histórico de revisões para esta página neste wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=Configura%C3%A7%C3%A3o_do_BIND_/_NAMED_no_Centos7&amp;diff=28&amp;oldid=prev</id>
		<title>imported&gt;Admin: uma edição</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Configura%C3%A7%C3%A3o_do_BIND_/_NAMED_no_Centos7&amp;diff=28&amp;oldid=prev"/>
		<updated>2020-08-08T02:45:26Z</updated>

		<summary type="html">&lt;p&gt;uma edição&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;pt-BR&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Edição anterior&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Edição das 02h45min de 8 de agosto de 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;4&quot; class=&quot;diff-notice&quot; lang=&quot;pt-BR&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(Sem diferença)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff cache key omph_wiki-maquine_:diff:1.41:old-27:rev-28 --&gt;
&lt;/table&gt;</summary>
		<author><name>imported&gt;Admin</name></author>
	</entry>
	<entry>
		<id>https://wiki.ourominas.com.br/index.php?title=Configura%C3%A7%C3%A3o_do_BIND_/_NAMED_no_Centos7&amp;diff=27&amp;oldid=prev</id>
		<title>2532252&gt;Jefferson em 17h47min de 28 de janeiro de 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.ourominas.com.br/index.php?title=Configura%C3%A7%C3%A3o_do_BIND_/_NAMED_no_Centos7&amp;diff=27&amp;oldid=prev"/>
		<updated>2019-01-28T17:47:14Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Página nova&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Material necessário ==&lt;br /&gt;
&lt;br /&gt;
Cpu que prove o serviço de nomes (named / bind / DNS )&lt;br /&gt;
&lt;br /&gt;
== Realizado por ==&lt;br /&gt;
&lt;br /&gt;
Todos do TI&lt;br /&gt;
&lt;br /&gt;
== Observação ==&lt;br /&gt;
&lt;br /&gt;
Material em ingles&lt;br /&gt;
&lt;br /&gt;
== Descrição ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
How to Setup Bind DNS Server in Chroot Jail on CentOS 7 skytech  October 22, 2014  Bind9, CentOS 7  2 Comments&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Share this Article :&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Guardar&lt;br /&gt;
bind dns&lt;br /&gt;
&lt;br /&gt;
BIND (Berkeley Internet Name Daemon) also known as NAMED is the most widely used linux dns server in the internet.&lt;br /&gt;
&lt;br /&gt;
This tutorial will explain how we can setup BIND DNS in a chroot jail in CentOS 7, the process is simply unable to see any part of the filesystem outside the jail. For example, in this post, i will configure BIND dns to run chrooted to the directory /var/named/chroot/.&lt;br /&gt;
&lt;br /&gt;
Well, to BIND dns, the contents of this directory will appear to be /, the root directory. A “jail” is a software mechanism for limiting the ability of a process to access resources outside a very limited area, and it’s purposely to enhance the security.&lt;br /&gt;
&lt;br /&gt;
Unlike with earlier versions of BIND, you typically will not need to compile named statically nor install shared libraries under the new root.&lt;br /&gt;
&lt;br /&gt;
Chroot Environment initialization script will mount the above configuration files using the mount –bind command, so that you can manage the configuration outside this environment. There is no need to copy anything into the /var/named/chroot/ directory because it is mounted automatically. This simplifies maintenance since you do not need to take any special care of BIND configuration files if it is run in a chroot environment. You can organize everything as you would with BIND not running in a chroot environment.&lt;br /&gt;
&lt;br /&gt;
Chrooted Bind DNS server was by default configured to /var/named/chroot. You may follow this complete steps to implement Bind Chroot DNS Server on CentOS 7 virtual private server (VPS).&lt;br /&gt;
&lt;br /&gt;
Also Read :   How to Install Varnish 4 on CentOS 6 / CentOS 7&lt;br /&gt;
Setup Bind DNS Server in Chroot Jail on CentOS 7&lt;br /&gt;
&lt;br /&gt;
1. Install Bind Chroot DNS server :&lt;br /&gt;
&lt;br /&gt;
# yum install bind-chroot -y&lt;br /&gt;
2. To enable the named-chroot service, first check if the named service is running by issuing the following command:&lt;br /&gt;
&lt;br /&gt;
# systemctl status named&lt;br /&gt;
If it is running, it must be disabled.&lt;br /&gt;
To disable named, issue the following commands as root:&lt;br /&gt;
&lt;br /&gt;
# systemctl stop named&lt;br /&gt;
# systemctl disable named&lt;br /&gt;
3. Initialize the /var/named/chroot environment by running:&lt;br /&gt;
&lt;br /&gt;
# /usr/libexec/setup-named-chroot.sh /var/named/chroot on&lt;br /&gt;
# systemctl stop named&lt;br /&gt;
# systemctl disable named&lt;br /&gt;
# systemctl start named-chroot&lt;br /&gt;
# systemctl enable named-chroot&lt;br /&gt;
ln -s &amp;#039;/usr/lib/systemd/system/named-chroot.service&amp;#039; &amp;#039;/etc/systemd/system/multi-user.target.wants/named-chroot.service&amp;#039;&lt;br /&gt;
The following directories are automatically mounted into the /var/named/chroot/ directory if the corresponding mount point directories underneath /var/named/chroot/ are empty:&lt;br /&gt;
&lt;br /&gt;
Verify Chroot Environment :&lt;br /&gt;
&lt;br /&gt;
# ll /var/named/chroot/etc&lt;br /&gt;
total 28&lt;br /&gt;
-rw-r--r-- 1 root root   372 Dec  1 23:04 localtime&lt;br /&gt;
drwxr-x--- 2 root named 4096 Nov 22 01:28 named&lt;br /&gt;
-rw-r----- 1 root named 1705 Mar 22  2016 named.conf&lt;br /&gt;
-rw-r--r-- 1 root named 2389 Nov 22 01:28 named.iscdlv.key&lt;br /&gt;
-rw-r----- 1 root named  931 Jun 21  2007 named.rfc1912.zones&lt;br /&gt;
-rw-r--r-- 1 root named  487 Jul 19  2010 named.root.key&lt;br /&gt;
drwxr-x--- 3 root named 4096 Jan  4 22:12 pki&lt;br /&gt;
# ll /var/named/chroot/var/named&lt;br /&gt;
total 32&lt;br /&gt;
drwxr-x--- 7 root  named 4096 Jan  4 22:12 chroot&lt;br /&gt;
drwxrwx--- 2 named named 4096 Nov 22 01:28 data&lt;br /&gt;
drwxrwx--- 2 named named 4096 Nov 22 01:28 dynamic&lt;br /&gt;
-rw-r----- 1 root  named 2076 Jan 28  2013 named.ca&lt;br /&gt;
-rw-r----- 1 root  named  152 Dec 15  2009 named.empty&lt;br /&gt;
-rw-r----- 1 root  named  152 Jun 21  2007 named.localhost&lt;br /&gt;
-rw-r----- 1 root  named  168 Dec 15  2009 named.loopback&lt;br /&gt;
drwxrwx--- 2 named named 4096 Nov 22 01:28 slaves&lt;br /&gt;
4. Create bind dns related files into chrooted directory :&lt;br /&gt;
&lt;br /&gt;
# touch /var/named/chroot/var/named/data/cache_dump.db&lt;br /&gt;
# touch /var/named/chroot/var/named/data/named_stats.txt&lt;br /&gt;
# touch /var/named/chroot/var/named/data/named_mem_stats.txt&lt;br /&gt;
# touch /var/named/chroot/var/named/data/named.run&lt;br /&gt;
# mkdir /var/named/chroot/var/named/dynamic&lt;br /&gt;
# touch /var/named/chroot/var/named/dynamic/managed-keys.bind&lt;br /&gt;
5. Bind lock file should be writeable, therefore set the permission to make it writable as below :&lt;br /&gt;
&lt;br /&gt;
# chmod -R 777 /var/named/chroot/var/named/data&lt;br /&gt;
# chmod -R 777 /var/named/chroot/var/named/dynamic&lt;br /&gt;
6. Copy /etc/named.conf chrooted bind config folder :&lt;br /&gt;
&lt;br /&gt;
# cp -p /etc/named.conf /var/named/chroot/etc/named.conf&lt;br /&gt;
7.Configure main bind configuration in /etc/named.conf. Append the example.local zone information to the file :&lt;br /&gt;
&lt;br /&gt;
# vi /var/named/chroot/etc/named.conf&lt;br /&gt;
Create forward and reverse zone into named.conf:&lt;br /&gt;
&lt;br /&gt;
..&lt;br /&gt;
..&lt;br /&gt;
zone &amp;quot;example.local&amp;quot; {&lt;br /&gt;
    type master;&lt;br /&gt;
    file &amp;quot;example.local.zone&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
zone &amp;quot;0.168.192.in-addr.arpa&amp;quot; IN {&lt;br /&gt;
        type master;&lt;br /&gt;
        file &amp;quot;192.168.0.zone&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
..&lt;br /&gt;
..&lt;br /&gt;
Full named.conf configuration :&lt;br /&gt;
&lt;br /&gt;
//&lt;br /&gt;
// named.conf&lt;br /&gt;
//&lt;br /&gt;
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS&lt;br /&gt;
// server as a caching only nameserver (as a localhost DNS resolver only).&lt;br /&gt;
//&lt;br /&gt;
// See /usr/share/doc/bind*/sample/ for example named configuration files.&lt;br /&gt;
//&lt;br /&gt;
&lt;br /&gt;
options {&lt;br /&gt;
        listen-on port 53 { any; };&lt;br /&gt;
        listen-on-v6 port 53 { ::1; };&lt;br /&gt;
        directory       &amp;quot;/var/named&amp;quot;;&lt;br /&gt;
        dump-file       &amp;quot;/var/named/data/cache_dump.db&amp;quot;;&lt;br /&gt;
        statistics-file &amp;quot;/var/named/data/named_stats.txt&amp;quot;;&lt;br /&gt;
        memstatistics-file &amp;quot;/var/named/data/named_mem_stats.txt&amp;quot;;&lt;br /&gt;
        allow-query     { any; };&lt;br /&gt;
&lt;br /&gt;
        /*&lt;br /&gt;
         - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.&lt;br /&gt;
         - If you are building a RECURSIVE (caching) DNS server, you need to enable&lt;br /&gt;
           recursion.&lt;br /&gt;
         - If your recursive DNS server has a public IP address, you MUST enable access&lt;br /&gt;
           control to limit queries to your legitimate users. Failing to do so will&lt;br /&gt;
           cause your server to become part of large scale DNS amplification&lt;br /&gt;
           attacks. Implementing BCP38 within your network would greatly&lt;br /&gt;
           reduce such attack surface&lt;br /&gt;
        */&lt;br /&gt;
        recursion yes;&lt;br /&gt;
&lt;br /&gt;
        dnssec-enable yes;&lt;br /&gt;
        dnssec-validation yes;&lt;br /&gt;
        dnssec-lookaside auto;&lt;br /&gt;
&lt;br /&gt;
        /* Path to ISC DLV key */&lt;br /&gt;
        bindkeys-file &amp;quot;/etc/named.iscdlv.key&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
        managed-keys-directory &amp;quot;/var/named/dynamic&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
        pid-file &amp;quot;/run/named/named.pid&amp;quot;;&lt;br /&gt;
        session-keyfile &amp;quot;/run/named/session.key&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
logging {&lt;br /&gt;
        channel default_debug {&lt;br /&gt;
                file &amp;quot;data/named.run&amp;quot;;&lt;br /&gt;
                severity dynamic;&lt;br /&gt;
        };&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
zone &amp;quot;.&amp;quot; IN {&lt;br /&gt;
        type hint;&lt;br /&gt;
        file &amp;quot;named.ca&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
zone &amp;quot;example.local&amp;quot; {&lt;br /&gt;
    type master;&lt;br /&gt;
    file &amp;quot;example.local.zone&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
zone &amp;quot;0.168.192.in-addr.arpa&amp;quot; IN {&lt;br /&gt;
        type master;&lt;br /&gt;
        file &amp;quot;192.168.0.zone&amp;quot;;&lt;br /&gt;
};&lt;br /&gt;
&lt;br /&gt;
include &amp;quot;/etc/named.rfc1912.zones&amp;quot;;&lt;br /&gt;
include &amp;quot;/etc/named.root.key&amp;quot;;&lt;br /&gt;
8. Create Forward and Reverse zone files for domain example.local.&lt;br /&gt;
&lt;br /&gt;
Also Read :   How to Prepare Other Yum Repositories For RHEL/CentOS 5&lt;br /&gt;
a) Create Forward Zone :&lt;br /&gt;
&lt;br /&gt;
# vi /var/named/chroot/var/named/example.local.zone&lt;br /&gt;
Add the following and save :&lt;br /&gt;
&lt;br /&gt;
;&lt;br /&gt;
;       Addresses and other host information.&lt;br /&gt;
;&lt;br /&gt;
$TTL 86400&lt;br /&gt;
@       IN      SOA     example.local. hostmaster.example.local. (&lt;br /&gt;
                               2014101901      ; Serial&lt;br /&gt;
                               43200      ; Refresh&lt;br /&gt;
                               3600       ; Retry&lt;br /&gt;
                               3600000    ; Expire&lt;br /&gt;
                               2592000 )  ; Minimum&lt;br /&gt;
&lt;br /&gt;
;       Define the nameservers and the mail servers&lt;br /&gt;
&lt;br /&gt;
               IN      NS      ns1.example.local.&lt;br /&gt;
               IN      NS      ns2.example.local.&lt;br /&gt;
               IN      A       192.168.0.70&lt;br /&gt;
               IN      MX      10 mx.example.local.&lt;br /&gt;
&lt;br /&gt;
centos7          IN      A       192.168.0.70&lt;br /&gt;
mx               IN      A       192.168.0.50&lt;br /&gt;
ns1              IN      A       192.168.0.70&lt;br /&gt;
ns2              IN      A       192.168.0.80&lt;br /&gt;
b) Create Reverse Zone :&lt;br /&gt;
&lt;br /&gt;
# vi /var/named/chroot/var/named/192.168.0.zone&lt;br /&gt;
;&lt;br /&gt;
;       Addresses and other host information.&lt;br /&gt;
;&lt;br /&gt;
$TTL 86400&lt;br /&gt;
@       IN      SOA     example.local. hostmaster.example.local. (&lt;br /&gt;
                               2014101901      ; Serial&lt;br /&gt;
                               43200      ; Refresh&lt;br /&gt;
                               3600       ; Retry&lt;br /&gt;
                               3600000    ; Expire&lt;br /&gt;
                               2592000 )  ; Minimum&lt;br /&gt;
&lt;br /&gt;
0.168.192.in-addr.arpa. IN      NS      centos7.example.local.&lt;br /&gt;
&lt;br /&gt;
70.0.168.192.in-addr.arpa. IN PTR mx.example.local.&lt;br /&gt;
70.0.168.192.in-addr.arpa. IN PTR ns1.example.local.&lt;br /&gt;
80.0.168.192.in-addr.arpa. IN PTR ns2.example.local.&lt;br /&gt;
Bind dns related articles&lt;br /&gt;
&lt;br /&gt;
How to Configure Bind-Chroot Logging on CentOS 6.2&lt;br /&gt;
How to Install and Configure Bind9 DNS on Ubuntu 11.10&lt;br /&gt;
How to Install and Configure Bind 9 as a Caching Server on Ubuntu 11.10&lt;br /&gt;
Also Read :   How to Install Nginx With PHP5 (and PHP-FPM) and MySQL (LEMP) On Ubuntu 14.04&lt;br /&gt;
Reference :&lt;br /&gt;
https://www.centos.org/docs/2/rhl-rg-en-7.2/ch-bind.html&lt;br /&gt;
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/ch-bind.html&lt;br /&gt;
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Networking_Guide/sec-BIND.html&lt;br /&gt;
&lt;br /&gt;
[[Category: LINUX]]&lt;br /&gt;
[[Category: NAMED]]&lt;br /&gt;
[[Category: BIND]]&lt;br /&gt;
[[Category: NP_TI]]&lt;/div&gt;</summary>
		<author><name>2532252&gt;Jefferson</name></author>
	</entry>
</feed>