# Buildsheet autogenerated by ravenadm tool -- Do not edit. NAMEBASE= bind VERSION= 9.18.26 KEYWORDS= dns net VARIANTS= standard SDESC[standard]= Berkeley Internet Name Domain (Domain Name Server) HOMEPAGE= https://www.isc.org/downloads/bind/ CONTACT= nobody DOWNLOAD_GROUPS= main SITES[main]= ISC/bind9/9.18.26 DISTFILE[1]= bind-9.18.26.tar.xz:main DF_INDEX= 1 SPKGS[standard]= complete server tools man dev docs OPTIONS_AVAILABLE= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE OPTIONS_STANDARD= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE BUILD_DEPENDS= idnkit:single:standard lmdb:dev:standard libnghttp2:dev:standard libuv:dev:standard json-c:dev:standard BUILDRUN_DEPENDS= json-c:primary:standard libuv:primary:standard lmdb:primary:standard libnghttp2:primary:standard EXRUN[tools]= idnkit:single:standard USES= cclibs:server,tools cpe iconv pkgconfig ssl readline ncurses:build libtool perl:build GNOME_COMPONENTS= libxml2 DISTNAME= bind-9.18.26 LICENSE= MPL:server LICENSE_FILE= MPL:{{WRKSRC}}/COPYRIGHT LICENSE_SCHEME= solo CPE_VENDOR= isc FPC_EQUIVALENT= dns/bind918 MUST_CONFIGURE= gnu CONFIGURE_ARGS= --localstatedir=/var --sysconfdir={{ETCDIR}} --disable-linux-caps --disable-dnstap --without-gssapi --with-readline --with-openssl={{OPENSSLBASE}} --with-lmdb STD_CDEFINES="-DDIG_SIGCHASE=1" SINGLE_JOB= yes INSTALL_REQ_TOOLCHAIN= yes PLIST_SUB= ETCDIR={{BIND_ETCDIR}} LIBVER=9.18.26 RC_SUBR= named:server SUB_FILES= pkg-message-server named.conf [FIXED_RRSET].DESCRIPTION= Enable fixed rrset ordering [FIXED_RRSET].CONFIGURE_ENABLE_BOTH= fixed-rrset [QUERYTRACE].DESCRIPTION= Enable the very verbose query tracelogging [QUERYTRACE].CONFIGURE_ENABLE_BOTH= querytrace [GEOIP].DESCRIPTION= Allow geographically based ACL [GEOIP].BUILDRUN_DEPENDS_ON= GeoIP:single:standard [GEOIP].CONFIGURE_ENABLE_BOTH= geoip [LARGE_FILE].DESCRIPTION= 64-bit file support [LARGE_FILE].CONFIGURE_ENABLE_BOTH= largefile post-patch: ${REINPLACE_CMD} -e "s|/opt/local|${PREFIX}|g" \ ${WRKSRC}/configure post-install: ${MKDIR} ${STAGEDIR}${ETCDIR} ${STAGEDIR}${STD_DOCDIR}/arm . for i in dynamic master slave working ${MKDIR} ${STAGEDIR}${ETCDIR}/$i . endfor . for l in bind/filter-a bind/filter-aaaa libbind9 libdns libirs libisc libisccc libisccfg libns ${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/${l}.so . endfor ${INSTALL_DATA} ${WRKDIR}/named.conf \ ${STAGEDIR}${ETCDIR}/named.conf.sample ${INSTALL_DATA} ${FILESDIR}/named.root \ ${STAGEDIR}${ETCDIR} ${INSTALL_DATA} ${FILESDIR}/empty.db \ ${STAGEDIR}${ETCDIR}/master ${INSTALL_DATA} ${FILESDIR}/localhost-forward.db \ ${STAGEDIR}${ETCDIR}/master ${INSTALL_DATA} ${FILESDIR}/localhost-reverse.db \ ${STAGEDIR}${ETCDIR}/master ${RM} -r ${STAGEDIR}/var # documentation ${INSTALL_DATA} ${WRKSRC}/doc/arm/*.rst ${STAGEDIR}${STD_DOCDIR}/arm ${INSTALL_DATA} ${WRKSRC}/CHANGES ${WRKSRC}/README* ${STAGEDIR}${STD_DOCDIR} [FILE:743:descriptions/desc.server] BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. The name BIND stands for "Berkeley Internet Name Domain", because the software originated in the early 1980s at the University of California at Berkeley. BIND is by far the most widely used DNS software on the Internet, providing a robust and stable platform on top of which organizations can build distributed computing systems with the knowledge that those systems are fully compliant with published DNS standards. The BIND software distribution has three parts: 1. Domain Name Resolver 2. Domain Name Authority server 3. Tools This package contains parts 1 and 2. [FILE:357:descriptions/desc.tools] BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. The name BIND stands for "Berkeley Internet Name Domain", because the software originated in the early 1980s at the University of California at Berkeley. This package contains the BIND tools. [FILE:98:distinfo] 75ffee52731e9604c849b658df29e927f1c4f01d5a71ea3ebcbeb63702cb6651 5519432 bind-9.18.26.tar.xz [FILE:618:manifests/plist.server] @sample %%ETCDIR%%/named.conf.sample %%ETCDIR%%/ bind.keys named.root %%ETCDIR%%/master/ empty.db localhost-forward.db localhost-reverse.db bin/named-checkconf lib/ libbind9-%%LIBVER%%.so libbind9.so libdns-%%LIBVER%%.so libdns.so libirs-%%LIBVER%%.so libirs.so libisc-%%LIBVER%%.so libisc.so libisccc-%%LIBVER%%.so libisccc.so libisccfg-%%LIBVER%%.so libisccfg.so libns-%%LIBVER%%.so libns.so lib/bind/ filter-a.so filter-aaaa.so sbin/ ddns-confgen named rndc rndc-confgen tsig-keygen @dir(bind,bind,) %%ETCDIR%%/dynamic @dir(bind,bind,) %%ETCDIR%%/slave @dir(bind,bind,) %%ETCDIR%%/working [FILE:304:manifests/plist.tools] bin/ arpaname delv dig dnssec-cds dnssec-dsfromkey dnssec-importkey dnssec-keyfromlabel dnssec-keygen dnssec-revoke dnssec-settime dnssec-signzone dnssec-verify host mdig named-checkzone named-compilezone named-journalprint named-nzd2nzf named-rrchecker nsec3hash nslookup nsupdate [FILE:624:manifests/plist.man] share/man/man1/ arpaname.1.gz delv.1.gz dig.1.gz dnssec-cds.1.gz dnssec-dsfromkey.1.gz dnssec-importkey.1.gz dnssec-keyfromlabel.1.gz dnssec-keygen.1.gz dnssec-revoke.1.gz dnssec-settime.1.gz dnssec-signzone.1.gz dnssec-verify.1.gz host.1.gz mdig.1.gz named-checkconf.1.gz named-checkzone.1.gz named-compilezone.1.gz named-journalprint.1.gz named-nzd2nzf.1.gz named-rrchecker.1.gz nsec3hash.1.gz nslookup.1.gz nsupdate.1.gz share/man/man5/ named.conf.5.gz rndc.conf.5.gz share/man/man8/ ddns-confgen.8.gz filter-a.8.gz filter-aaaa.8.gz named.8.gz rndc-confgen.8.gz rndc.8.gz tsig-keygen.8.gz [FILE:2355:manifests/plist.dev] include/bind9/ check.h getaddresses.h include/dns/ acl.h adb.h badcache.h bit.h byaddr.h cache.h callbacks.h catz.h cert.h client.h clientinfo.h compress.h db.h dbiterator.h diff.h dispatch.h dlz.h dlz_dlopen.h dns64.h dnsrps.h dnssec.h dnstap.h ds.h dsdigest.h dyndb.h ecs.h edns.h enumclass.h enumtype.h events.h fixedname.h forward.h geoip.h ipkeylist.h iptable.h journal.h kasp.h keydata.h keyflags.h keymgr.h keytable.h keyvalues.h librpz.h log.h lookup.h master.h masterdump.h message.h name.h ncache.h nsec.h nsec3.h nta.h opcode.h order.h peer.h private.h rbt.h rcode.h rdata.h rdataclass.h rdatalist.h rdataset.h rdatasetiter.h rdataslab.h rdatastruct.h rdatatype.h request.h resolver.h result.h rootns.h rpz.h rriterator.h rrl.h sdb.h sdlz.h secalg.h secproto.h soa.h ssu.h stats.h time.h tkey.h transport.h tsec.h tsig.h ttl.h types.h update.h validator.h view.h xfrin.h zone.h zonekey.h zoneverify.h zt.h include/dst/ dst.h gssapi.h include/irs/resconf.h include/isc/ aes.h align.h app.h assertions.h astack.h atomic.h attributes.h backtrace.h barrier.h base32.h base64.h buffer.h cmocka.h commandline.h condition.h counter.h crc64.h deprecated.h dir.h endian.h errno.h error.h event.h eventclass.h file.h formatcheck.h fuzz.h glob.h hash.h heap.h hex.h hmac.h ht.h httpd.h interfaceiter.h iterated_hash.h lang.h lex.h list.h log.h magic.h managers.h md.h mem.h meminfo.h mutex.h mutexblock.h net.h netaddr.h netdb.h netmgr.h netscope.h nonce.h offset.h once.h os.h parseint.h pool.h portset.h print.h quota.h radix.h random.h ratelimiter.h refcount.h regex.h region.h resource.h result.h rwlock.h safe.h serial.h siphash.h sockaddr.h stat.h stats.h stdatomic.h stdio.h stdtime.h strerr.h string.h symtab.h syslog.h task.h taskpool.h thread.h time.h timer.h tls.h tm.h types.h url.h utf8.h util.h include/isccc/ alist.h base64.h cc.h ccmsg.h events.h sexpr.h symtab.h symtype.h types.h util.h include/isccfg/ aclconf.h cfg.h duration.h grammar.h kaspconf.h log.h namedconf.h include/ns/ client.h events.h hooks.h interfacemgr.h listenlist.h log.h notify.h query.h server.h sortlist.h stats.h types.h update.h xfrout.h [FILE:148:files/empty.db] $TTL 3h @ SOA @ nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL @ NS @ ; Silence a BIND warning @ A 127.0.0.1 [FILE:158:files/localhost-forward.db] $TTL 3h localhost. SOA localhost. nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL NS localhost. A 127.0.0.1 AAAA ::1 [FILE:226:files/localhost-reverse.db] $TTL 3h @ SOA localhost. nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL NS localhost. 1.0.0 PTR localhost. 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 PTR localhost. [FILE:19802:files/named.conf.in] // Refer to the named.conf(5) and named(8) man pages, and the documentation // in /usr/local/share/doc/bind for more details. // // If you are going to set up an authoritative server, make sure you // understand the hairy details of how DNS works. Even with // simple mistakes, you can break connectivity for affected parties, // or cause huge amounts of useless Internet traffic. options { // All file and path names are relative to the chroot directory, // if any, and should be fully qualified. directory "%%ETCDIR%%/working"; pid-file "/var/run/named/pid"; dump-file "/var/dump/named_dump.db"; statistics-file "/var/stats/named.stats"; // If named is being used only as a local resolver, this is a safe default. // For named to be accessible to the network, comment this option, specify // the proper IP address, or delete this option. listen-on { 127.0.0.1; }; // If you have IPv6 enabled on this system, uncomment this option for // use as a local resolver. To give access to the network, specify // an IPv6 address, or the keyword "any". // listen-on-v6 { ::1; }; // These zones are already covered by the empty zones listed below. // If you remove the related empty zones below, comment these lines out. disable-empty-zone "255.255.255.255.IN-ADDR.ARPA"; disable-empty-zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA"; disable-empty-zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA"; // If you've got a DNS server around at your upstream provider, enter // its IP address here, and enable the line below. This will make you // benefit from its cache, thus reduce overall DNS traffic in the Internet. /* forwarders { 127.0.0.1; }; */ // If the 'forwarders' clause is not empty the default is to 'forward first' // which will fall back to sending a query from your local server if the name // servers in 'forwarders' do not have the answer. Alternatively you can // force your name server to never initiate queries of its own by enabling the // following line: // forward only; // If you wish to have forwarding configured automatically based on // the entries in /etc/resolv.conf, uncomment the following line and // set named_auto_forward=yes in /etc/rc.conf. You can also enable // named_auto_forward_only (the effect of which is described above). // include "%%ETCDIR%%/auto_forward.conf"; /* Modern versions of BIND use a random UDP port for each outgoing query by default in order to dramatically reduce the possibility of cache poisoning. All users are strongly encouraged to utilize this feature, and to configure their firewalls to accommodate it. AS A LAST RESORT in order to get around a restrictive firewall policy you can try enabling the option below. Use of this option will significantly reduce your ability to withstand cache poisoning attacks, and should be avoided if at all possible. Replace NNNNN in the example with a number between 49160 and 65530. */ // query-source address * port NNNNN; }; // If you enable a local name server, don't forget to enter 127.0.0.1 // first in your /etc/resolv.conf so this server will be queried. // Also, make sure to enable it in /etc/rc.conf. // The traditional root hints mechanism. Use this, OR the slave zones below. zone "." { type hint; file "%%ETCDIR%%/named.root"; }; /* Slaving the following zones from the root name servers has some significant advantages: 1. Faster local resolution for your users 2. No spurious traffic will be sent from your network to the roots 3. Greater resilience to any potential root server failure/DDoS On the other hand, this method requires more monitoring than the hints file to be sure that an unexpected failure mode has not incapacitated your server. Name servers that are serving a lot of clients will benefit more from this approach than individual hosts. Use with caution. To use this mechanism, uncomment the entries below, and comment the hint zone above. As documented at http://dns.icann.org/services/axfr/ these zones: "." (the root), ARPA, IN-ADDR.ARPA, IP6.ARPA, and a few others are available for AXFR from these servers on IPv4 and IPv6: xfr.lax.dns.icann.org, xfr.cjr.dns.icann.org */ /* zone "." { type slave; file "%%ETCDIR%%/slave/root.slave"; masters { 192.0.32.132; // lax.xfr.dns.icann.org 2620:0:2d0:202::132; // lax.xfr.dns.icann.org 192.0.47.132; // iad.xfr.dns.icann.org 2620:0:2830:202::132; // iad.xfr.dns.icann.org }; notify no; }; zone "arpa" { type slave; file "%%ETCDIR%%/slave/arpa.slave"; masters { 192.0.32.132; // lax.xfr.dns.icann.org 2620:0:2d0:202::132; // lax.xfr.dns.icann.org 192.0.47.132; // iad.xfr.dns.icann.org 2620:0:2830:202::132; // iad.xfr.dns.icann.org }; notify no; }; zone "in-addr.arpa" { type slave; file "%%ETCDIR%%/slave/in-addr.arpa.slave"; masters { 192.0.32.132; // lax.xfr.dns.icann.org 2620:0:2d0:202::132; // lax.xfr.dns.icann.org 192.0.47.132; // iad.xfr.dns.icann.org 2620:0:2830:202::132; // iad.xfr.dns.icann.org }; notify no; }; zone "ip6.arpa" { type slave; file "%%ETCDIR%%/slave/ip6.arpa.slave"; masters { 192.0.32.132; // lax.xfr.dns.icann.org 2620:0:2d0:202::132; // lax.xfr.dns.icann.org 192.0.47.132; // iad.xfr.dns.icann.org 2620:0:2830:202::132; // iad.xfr.dns.icann.org }; notify no; }; */ /* Serving the following zones locally will prevent any queries for these zones leaving your network and going to the root name servers. This has two significant advantages: 1. Faster local resolution for your users 2. No spurious traffic will be sent from your network to the roots */ // RFCs 1912, 5735 and 6303 (and BCP 32 for localhost) zone "localhost" { type master; file "%%ETCDIR%%/master/localhost-forward.db"; }; zone "127.in-addr.arpa" { type master; file "%%ETCDIR%%/master/localhost-reverse.db"; }; zone "255.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // RFC 1912-style zone for IPv6 localhost address (RFC 6303) zone "0.ip6.arpa" { type master; file "%%ETCDIR%%/master/localhost-reverse.db"; }; // "This" Network (RFCs 1912, 5735 and 6303) zone "0.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // Private Use Networks (RFCs 1918, 5735 and 6303) zone "10.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "16.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "17.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "18.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "19.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "20.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "21.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "22.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "23.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "24.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "25.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "26.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "27.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "28.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "29.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "30.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "31.172.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "168.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // Shared Address Space (RFC 6598) zone "64.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "65.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "66.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "67.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "68.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "69.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "70.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "71.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "72.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "73.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "74.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "75.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "76.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "77.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "78.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "79.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "80.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "81.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "82.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "83.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "84.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "85.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "86.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "87.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "88.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "89.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "90.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "91.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "92.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "93.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "94.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "95.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "96.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "97.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "98.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "99.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "100.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "101.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "102.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "103.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "104.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "105.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "106.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "107.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "108.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "109.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "110.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "111.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "112.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "113.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "114.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "115.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "116.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "117.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "118.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "119.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "120.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "121.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "122.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "123.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "124.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "125.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "126.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "127.100.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // Link-local/APIPA (RFCs 3927, 5735 and 6303) zone "254.169.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IETF protocol assignments (RFCs 5735 and 5736) zone "0.0.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // TEST-NET-[1-3] for Documentation (RFCs 5735, 5737 and 6303) zone "2.0.192.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "100.51.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "113.0.203.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IPv6 Example Range for Documentation (RFCs 3849 and 6303) zone "8.b.d.0.1.0.0.2.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // Router Benchmark Testing (RFCs 2544 and 5735) zone "18.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "19.198.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IANA Reserved - Old Class E Space (RFC 5735) zone "240.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "241.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "242.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "243.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "244.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "245.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "246.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "247.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "248.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "249.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "250.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "251.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "252.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "253.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "254.in-addr.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IPv6 Unassigned Addresses (RFC 4291) zone "1.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "3.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "4.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "5.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "6.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "7.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "8.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "9.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "a.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "b.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "c.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "d.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "e.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "0.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "1.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "2.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "3.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "4.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "5.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "6.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "7.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "8.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "9.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "a.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "b.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "0.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "1.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "2.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "3.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "4.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "5.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "6.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "7.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IPv6 ULA (RFCs 4193 and 6303) zone "c.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "d.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IPv6 Link Local (RFCs 4291 and 6303) zone "8.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "9.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "a.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "b.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IPv6 Deprecated Site-Local Addresses (RFCs 3879 and 6303) zone "c.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "d.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "e.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; zone "f.e.f.ip6.arpa" { type master; file "%%ETCDIR%%/master/empty.db"; }; // IP6.INT is Deprecated (RFC 4159) zone "ip6.int" { type master; file "%%ETCDIR%%/master/empty.db"; }; // NB: Do not use the IP addresses below, they are faked, and only // serve demonstration/documentation purposes! // // Example slave zone config entries. It can be convenient to become // a slave at least for the zone your own domain is in. Ask // your network administrator for the IP address of the responsible // master name server. // // Do not forget to include the reverse lookup zone! // This is named after the first bytes of the IP address, in reverse // order, with ".IN-ADDR.ARPA" appended, or ".IP6.ARPA" for IPv6. // // Before starting to set up a master zone, make sure you fully // understand how DNS and BIND work. There are sometimes // non-obvious pitfalls. Setting up a slave zone is usually simpler. // // NB: Don't blindly enable the examples below. :-) Use actual names // and addresses instead. /* An example dynamic zone key "exampleorgkey" { algorithm hmac-md5; secret "sf87HJqjkqh8ac87a02lla=="; }; zone "example.org" { type master; allow-update { key "exampleorgkey"; }; file "%%ETCDIR%%/dynamic/example.org"; }; */ /* Example of a slave reverse zone zone "1.168.192.in-addr.arpa" { type slave; file "%%ETCDIR%%/slave/1.168.192.in-addr.arpa"; masters { 192.168.1.1; }; }; */ [FILE:11622:files/named.in] #!/bin/sh # # PROVIDE: named # REQUIRE: %%NAMED_REQUIRE%% # BEFORE: %%NAMED_BEFORE%% # KEYWORD: shutdown # # Add the following lines to /etc/rc.conf to enable BIND: # named_enable (bool): Run named, the DNS server (or NO). # named_program (str): Path to named, if you want a different one. # named_conf (str): Path to the configuration file # named_flags (str): Use this for flags OTHER than -u and -c # named_uid (str): User to run named as # named_chrootdir (str): Chroot directory (or "" not to auto-chroot it) # Historically, was /var/named # named_chroot_autoupdate (bool): Automatically install/update chrooted # components of named. # named_symlink_enable (bool): Symlink the chrooted pid file # named_wait (bool): Wait for working name service before exiting # named_wait_host (str): Hostname to check if named_wait is enabled # named_auto_forward (str): Set up forwarders from /etc/resolv.conf # named_auto_forward_only (str): Do "forward only" instead of "forward first" # . /etc/rc.subr name=named desc="named BIND startup script" rcvar=named_enable load_rc_config ${name} extra_commands=reload start_precmd=named_prestart start_postcmd=named_poststart reload_cmd=named_reload stop_cmd=named_stop stop_postcmd=named_poststop named_enable=${named_enable:-"NO"} named_program=${named_program:-"%%PREFIX%%/sbin/named"} named_conf=${named_conf:-"%%ETCDIR%%/named.conf"} named_flags=${named_flags:-""} named_uid=${named_uid:-"bind"} named_chrootdir=${named_chrootdir:-""} named_chroot_autoupdate=${named_chroot_autoupdate:-"YES"} named_symlink_enable=${named_symlink_enable:-"YES"} named_wait=${named_wait:-"NO"} named_wait_host=${named_wait_host:-"localhost"} named_auto_forward=${named_auto_forward:-"NO"} named_auto_forward_only=${named_auto_forward_only:-"NO"} # Not configuration variables but having them here keeps rclint happy required_dirs="${named_chrootdir}" _named_confdirroot="${named_conf%/*}" _named_confdir="${named_chrootdir}${_named_confdirroot}" _named_program_root="${named_program%/sbin/named}" _openssl_engines="%%LOCALBASE%%/lib/engines" # Needed if named.conf and rndc.conf are moved or if rndc.conf is used rndc_conf=${rndc_conf:-"$_named_confdir/rndc.conf"} rndc_key=${rndc_key:-"$_named_confdir/rndc.key"} # If running in a chroot cage, ensure that the appropriate files # exist inside the cage, as well as helper symlinks into the cage # from outside. # # As this is called after the is_running and required_dir checks # are made in run_rc_command(), we can safely assume ${named_chrootdir} # exists and named isn't running at this point (unless forcestart # is used). # chroot_autoupdate() { local file # If it's the first time around, fiddle with things and move the # current configuration to the chroot. if [ -d ${_named_confdirroot} -a ! -d ${_named_confdir} ]; then warn "named chroot: Moving current configuration in the chroot!" install -d ${_named_confdir%/*} mv ${_named_confdirroot} ${_named_confdir} fi # Create (or update) the chroot directory structure # if [ -r %%PREFIX%%/etc/mtree/BIND.chroot.dist ]; then mtree -deU -f %%PREFIX%%/etc/mtree/BIND.chroot.dist \ -p ${named_chrootdir} else warn "%%PREFIX%%/etc/mtree/BIND.chroot.dist missing," warn "${named_chrootdir} directory structure not updated" fi if [ -r %%PREFIX%%/etc/mtree/BIND.chroot.local.dist ]; then mkdir -p ${named_chrootdir}%%PREFIX%% mtree -deU -f %%PREFIX%%/etc/mtree/BIND.chroot.local.dist \ -p ${named_chrootdir}%%PREFIX%% else warn "%%PREFIX%%/etc/mtree/BIND.chroot.local.dist missing," warn "${named_chrootdir}%%PREFIX%% directory structure not updated" fi # Create (or update) the configuration directory symlink # if [ ! -L "${_named_confdirroot}" ]; then if [ -d "${_named_confdirroot}" ]; then warn "named chroot: ${_named_confdirroot} is a directory!" elif [ -e "${_named_confdirroot}" ]; then warn "named chroot: ${_named_confdirroot} exists!" else ln -s ${_named_confdir} ${_named_confdirroot} fi else # Make sure it points to the right place. ln -shf ${_named_confdir} ${_named_confdirroot} fi # Mount a devfs in the chroot directory if needed # if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then umount ${named_chrootdir}/dev 2>/dev/null devfs_domount ${named_chrootdir}/dev devfsrules_hide_all devfs -m ${named_chrootdir}/dev rule apply path null unhide devfs -m ${named_chrootdir}/dev rule apply path random unhide else if [ -c ${named_chrootdir}/dev/null -a \ -c ${named_chrootdir}/dev/random ]; then info "named chroot: using pre-mounted devfs." else err 1 "named chroot: devfs cannot be mounted from " \ "within a jail. Thus a chrooted named cannot " \ "be run from within a jail. Either mount the " \ "devfs with null and random from the host, or " \ "run named without chrooting it, set " \ "named_chrootdir=\"\" in /etc/rc.conf." fi fi # If OpenSSL from ports, then the engines should be present in the # chroot, named loads them after chrooting. if [ -d ${_openssl_engines} ]; then # FIXME when 8.4 is gone see if # security.jail.param.allow.mount.nullfs can be used. if [ `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 ]; then mkdir -p ${named_chrootdir}${_openssl_engines} mount -t nullfs ${_openssl_engines} ${named_chrootdir}${_openssl_engines} else warn "named chroot: cannot nullfs mount OpenSSL" \ "engines into the chroot, will copy the shared" \ "libraries instead." mkdir -p ${named_chrootdir}${_openssl_engines} cp -f ${_openssl_engines}/*.so ${named_chrootdir}${_openssl_engines} fi fi # Copy and/or update key files to the chroot /etc # for file in localtime protocols services; do if [ -r /etc/${file} ] && \ ! cmp -s /etc/${file} "${named_chrootdir}/etc/${file}"; then cp -p /etc/${file} "${named_chrootdir}/etc/${file}" fi done } # Make symlinks to the correct pid file # make_symlinks() { checkyesno named_symlink_enable && ln -fs "${named_chrootdir}${pidfile}" ${pidfile} } named_poststart() { make_symlinks if checkyesno named_wait; then until ${_named_program_root}/bin/host ${named_wait_host} >/dev/null 2>&1; do echo " Waiting for nameserver to resolve ${named_wait_host}" sleep 1 done fi } named_reload() { # This is a one line function, but ${named_program} is not defined early # enough to be there when the reload_cmd variable is defined up there. rndc reload } find_pidfile() { if get_pidfile_from_conf pid-file ${named_conf}; then pidfile="${_pidfile_from_conf}" else pidfile="/var/run/named/pid" fi } named_stop() { find_pidfile # This duplicates an undesirably large amount of code from the stop # routine in rc.subr in order to use rndc to shut down the process, # and to give it a second chance in case rndc fails. rc_pid=$(check_pidfile ${pidfile} ${command}) if [ -z "${rc_pid}" ]; then [ -n "${rc_fast}" ] && return 0 _run_rc_notrunning return 1 fi echo 'Stopping named.' if rndc stop; then wait_for_pids ${rc_pid} else echo -n 'rndc failed, trying kill: ' kill -TERM ${rc_pid} wait_for_pids ${rc_pid} fi } named_poststop() { if [ -n "${named_chrootdir}" -a -c ${named_chrootdir}/dev/null ]; then # if using OpenSSL from ports, unmount OpenSSL engines, if they # were not mounted but only copied, do nothing. if [ -d ${_openssl_engines} -a \( `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 \) ]; then umount ${named_chrootdir}${_openssl_engines} fi # unmount /dev if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then umount ${named_chrootdir}/dev 2>/dev/null || true else warn "named chroot:" \ "cannot unmount devfs from inside jail!" fi fi } create_file() { if [ -e "$1" ]; then unlink $1 fi install -o root -g wheel -m 0644 /dev/null $1 } rndc() { if [ -z "${rndc_flags}" ]; then if [ -s "${rndc_conf}" ] ; then rndc_flags="-c ${rndc_conf}" elif [ -s "${rndc_key}" ] ; then rndc_flags="-k ${rndc_key}" else rndc_flags="" fi fi ${_named_program_root}/sbin/rndc ${rndc_flags} "$@" } named_prestart() { find_pidfile if [ -n "${named_pidfile}" ]; then warn 'named_pidfile: now determined from the conf file' fi piddir=`/usr/bin/dirname ${pidfile}` if [ ! -d ${piddir} ]; then install -d -o ${named_uid} -g ${named_uid} ${piddir} fi command_args="-u ${named_uid:=root} -c ${named_conf} ${command_args}" local line nsip firstns # Is the user using a sandbox? # if [ -n "${named_chrootdir}" ]; then rc_flags="${rc_flags} -t ${named_chrootdir}" checkyesno named_chroot_autoupdate && chroot_autoupdate else named_symlink_enable=NO fi # Create an rndc.key file for the user if none exists # confgen_command="${_named_program_root}/sbin/rndc-confgen -a -b256 -u ${named_uid} \ -c ${_named_confdir}/rndc.key" if [ -s "${_named_confdir}/rndc.conf" ]; then unset confgen_command fi if [ -s "${_named_confdir}/rndc.key" ]; then case `stat -f%Su ${_named_confdir}/rndc.key` in root|${named_uid}) ;; *) ${confgen_command} ;; esac else ${confgen_command} fi local checkconf checkconf="${_named_program_root}/bin/named-checkconf" if ! checkyesno named_chroot_autoupdate && [ -n "${named_chrootdir}" ]; then checkconf="${checkconf} -t ${named_chrootdir}" fi # Create a forwarder configuration based on /etc/resolv.conf if checkyesno named_auto_forward; then if [ ! -s /etc/resolv.conf ]; then warn "named_auto_forward enabled, but no /etc/resolv.conf" # Empty the file in case it is included in named.conf [ -s "${_named_confdir}/auto_forward.conf" ] && create_file ${_named_confdir}/auto_forward.conf ${checkconf} ${named_conf} || err 3 'named-checkconf for ${named_conf} failed' return fi create_file /var/run/naf-resolv.conf create_file /var/run/auto_forward.conf echo ' forwarders {' > /var/run/auto_forward.conf while read line; do case "${line}" in 'nameserver '*|'nameserver '*) nsip=${line##nameserver[ ]} if [ -z "${firstns}" ]; then if [ ! "${nsip}" = '127.0.0.1' ]; then echo 'nameserver 127.0.0.1' echo " ${nsip};" >> /var/run/auto_forward.conf fi firstns=1 else [ "${nsip}" = '127.0.0.1' ] && continue echo " ${nsip};" >> /var/run/auto_forward.conf fi ;; esac echo ${line} done < /etc/resolv.conf > /var/run/naf-resolv.conf echo ' };' >> /var/run/auto_forward.conf echo '' >> /var/run/auto_forward.conf if checkyesno named_auto_forward_only; then echo " forward only;" >> /var/run/auto_forward.conf else echo " forward first;" >> /var/run/auto_forward.conf fi if cmp -s /etc/resolv.conf /var/run/naf-resolv.conf; then unlink /var/run/naf-resolv.conf else [ -e /etc/resolv.conf ] && unlink /etc/resolv.conf mv /var/run/naf-resolv.conf /etc/resolv.conf fi if cmp -s ${_named_confdir}/auto_forward.conf \ /var/run/auto_forward.conf; then unlink /var/run/auto_forward.conf else [ -e "${_named_confdir}/auto_forward.conf" ] && unlink ${_named_confdir}/auto_forward.conf mv /var/run/auto_forward.conf \ ${_named_confdir}/auto_forward.conf fi else # Empty the file in case it is included in named.conf [ -s "${_named_confdir}/auto_forward.conf" ] && create_file ${_named_confdir}/auto_forward.conf fi ${checkconf} ${named_conf} || err 3 "named-checkconf for ${named_conf} failed" } run_rc_command "$1" [FILE:3289:files/named.root] ; This file holds the information on root name servers needed to ; initialize cache of Internet domain name servers ; (e.g. reference this file in the "cache . " ; configuration file of BIND domain name servers). ; ; This file is made available by InterNIC ; under anonymous FTP as ; file /domain/named.cache ; on server FTP.INTERNIC.NET ; -OR- RS.INTERNIC.NET ; ; last update: April 11, 2017 ; related version of root zone: 2017041101 ; ; formerly NS.INTERNIC.NET ; . 3600000 NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30 ; ; FORMERLY NS1.ISI.EDU ; . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 192.228.79.201 B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:84::b ; ; FORMERLY C.PSI.NET ; . 3600000 NS C.ROOT-SERVERS.NET. C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c ; ; FORMERLY TERP.UMD.EDU ; . 3600000 NS D.ROOT-SERVERS.NET. D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13 D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d ; ; FORMERLY NS.NASA.GOV ; . 3600000 NS E.ROOT-SERVERS.NET. E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10 E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e ; ; FORMERLY NS.ISC.ORG ; . 3600000 NS F.ROOT-SERVERS.NET. F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241 F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f ; ; FORMERLY NS.NIC.DDN.MIL ; . 3600000 NS G.ROOT-SERVERS.NET. G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4 G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d ; ; FORMERLY AOS.ARL.ARMY.MIL ; . 3600000 NS H.ROOT-SERVERS.NET. H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53 H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53 ; ; FORMERLY NIC.NORDU.NET ; . 3600000 NS I.ROOT-SERVERS.NET. I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17 I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53 ; ; OPERATED BY VERISIGN, INC. ; . 3600000 NS J.ROOT-SERVERS.NET. J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30 J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30 ; ; OPERATED BY RIPE NCC ; . 3600000 NS K.ROOT-SERVERS.NET. K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129 K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1 ; ; OPERATED BY ICANN ; . 3600000 NS L.ROOT-SERVERS.NET. L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42 L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42 ; ; OPERATED BY WIDE ; . 3600000 NS M.ROOT-SERVERS.NET. M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35 ; End of file [FILE:1637:files/pkg-message-server.in] ********************************************************************** * _ _____ _____ _____ _ _ _____ ___ ___ _ _ * * / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | * * / _ \ | | | | | _| | \| | | | | | | | | \| | * * / ___ \| | | | | |___| |\ | | | | | |_| | |\ | * * /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| * * * * BIND requires configuration of rndc, including a "secret" key. * * The easiest, and most secure way to configure rndc is to run * * 'rndc-confgen -a' to generate the proper conf file, with a new * * random key, and appropriate file permissions. * * * * The %%PREFIX%%/etc/rc.d/named script will do that for you. * * * * If using syslog to log the BIND9 activity, and using a * * chroot'ed installation, you will need to tell syslog to * * install a log socket in the BIND9 chroot by running: * * * * # sysrc altlog_proglist+=named * * * * And then restarting syslogd with: service syslogd restart * * * ********************************************************************** [FILE:59:files/special.mk] BIND_ETCDIR?= etc/namedb ETCDIR= ${PREFIX}/${BIND_ETCDIR}