反向區域DNS解析服務

前期準備:反向解析的tree結構是從根往下數,第二級爲arpa,第三級爲in-addr,第四級爲IP,表示出來是:254.58.168.192.in-addr.apra.

1、建立反向解析區域:
[root@centos7 ~]# vim /etc/named.rfc1912.zones
 type master;
      file "magedu.com.zones";
};
zone "localhost.localdomain" IN {
        type master;
        file "named.localhost";
        allow-update { none; };
};

zone "localhost" IN {
        type master;
        file "named.localhost";
        allow-update { none; };
};

zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" IN {
        type master;
        file "named.loopback";
        allow-update { none; };
};
zone "58.168.192.in-addr.arpa" IN {
       type master;
       file  "named.loopback";
       allow-update { none; };
};                                                                                                                    
"/etc/named.rfc1912.zones" 49L, 1126C
照貓畫虎,我們添加了zone "58.168.192.in-addr.arpa" IN {
       type master;
       file  "named.loopback";
       allow-update { none; };
};        內容!

2、[root@centos7 ~]# cd /var/named
[root@centos7 named]# ls
data  dynamic  magedu.com.zone  named.ca  named.empty  named.localhost  named.loopback  slaves
[root@centos7 named]# vim 192.168.58.zone
$TTL  86400
@   IN   SOA  master  admin.magedu.com.  (  0  1H  20M  1D  1H )
    NS   master
master   A  192.168.58.254
254      PTR    master.magedu.com.
8        PTR   www.magedu.com.
9        PTR   www.wange.com.     
[root@centos7 named]# rndc reload
server reload successful       (此處使腳本生效)
以上內容爲反向解析腳本內容!

3、測試反向解析結果如下:

[root@Centos6 ~]# dig -x 192.168.58.254

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6 <<>> -x 192.168.58.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7237
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.58.168.192.in-addr.arpa. IN PTR

;; AUTHORITY SECTION:
58.168.192.in-addr.arpa. 10800 IN SOA 58.168.192.in-addr.arpa. rname.invalid. 0 86400 3600 604800 10800

;; Query time: 7 msec
;; SERVER: 192.168.58.254#53(192.168.58.254)
;; WHEN: Thu Jan 31 21:06:38 2019
;; MSG SIZE rcvd: 94

[root@Centos6 ~]# dig -x 192.168.58.8

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6 <<>> -x 192.168.58.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53711
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.58.168.192.in-addr.arpa. IN PTR

;; AUTHORITY SECTION:
58.168.192.in-addr.arpa. 10800 IN SOA 58.168.192.in-addr.arpa. rname.invalid. 0 86400 3600 604800 10800

;; Query time: 6 msec
;; SERVER: 192.168.58.254#53(192.168.58.254)
;; WHEN: Thu Jan 31 21:06:49 2019
;; MSG SIZE rcvd: 92

[root@Centos6 ~]# dig -x 192.168.58.9

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6 <<>> -x 192.168.58.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26461
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.58.168.192.in-addr.arpa. IN PTR

;; AUTHORITY SECTION:
58.168.192.in-addr.arpa. 10800 IN SOA 58.168.192.in-addr.arpa. rname.invalid. 0 86400 3600 604800 10800

;; Query time: 1 msec
;; SERVER: 192.168.58.254#53(192.168.58.254)
;; WHEN: Thu Jan 31 21:06:53 2019
;; MSG SIZE rcvd: 92

以上內容爲反向解析的內容!!!

當我們不小心把網址輸錯了,但是百度,京東,淘寶等網站卻還可以訪問是爲什麼?
答:他們在下面添加了  *   無論用戶輸入什麼信息,只要後綴正確,均可以訪問。
[root@centos7 named]# vim  magedu.com.zone

$TTL  1D

@     IN SOA  master  admin.magedu.com.  (
                    20190131             ; serial
                    1D     ; refresh
                    1H     ; retry
                    1W     ; expire
                    3H   )  ;  minimun
        NS      master
    @           A           192.68.58.130
master      A           192.168.58.254
 www         CNAME       websrv
 websrv      A           192.168.58.133
 blog        A           192.168.58.136
 @           mx          10  mailsrv1
 @           mx          20  mailsrv2
 mailsrv1    A           192.168.58.137
 mailsrv2    A           192.168.58.138
*            A           192.168.58.254  

[root@Centos6 ~]# ping wwwwwwww.magedu.com
PING www.magedu.com (101.200.188.230) 56(84) bytes of data.
64 bytes from 101.200.188.230: icmp_seq=1 ttl=53 time=5.48 ms
64 bytes from 101.200.188.230: icmp_seq=2 ttl=53 time=6.39 ms
64 bytes from 101.200.188.230: icmp_seq=3 ttl=53 time=6.84 ms
64 bytes from 101.200.188.230: icmp_seq=4 ttl=53 time=5.84 m
這是加 *  的效果,
[root@Centos6 ~]# ping magedu.com
PING magedu.com (101.200.188.230) 56(84) bytes of data.
64 bytes from 101.200.188.230: icmp_seq=1 ttl=53 time=7.01 ms
64 bytes from 101.200.188.230: icmp_seq=2 ttl=53 time=5.59 ms
64 bytes from 101.200.188.230: icmp_seq=3 ttl=53 time=7.43 ms
這是加 @ 的效果。
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章