DNS区域传送、子域授权

前言

DNS服务器搭建参考上一篇;
DNS主从复制,就是将主DNS服务器的解析库复制传送至从DNS服务器,进而从服务器就可以进行正向、反向解析了。从服务器向主服务器更新查询数据,保证数据一致性,此为区域传送。也可以说,DNS区域传送,就是DNS主从复制的实现方法,DNS主从复制是DNS区域传送的表现形式。
DNS区域传送的两种方式:

  • zxfr:完全区域传送
  • ixfr:增量区域传送

当一个新的DNS服务器添加到区域中并配置为从DNS服务器时,它则会执行完全区域传送,在主DNS服务器上获取完整的资源记录副本;同时为了保证数据同步,主域名服务器有更新时也会及时通知辅助域名服务器从而进行更新(增量区域传送)。

区域传送

主服务器:192.168.2.72
从服务器: 192.168.2.104
两台服务器都提前安装好named服务

完全区域传送

1.对主服务器/etc/named.conf配置进行修改,在options配置段内增加:

notify yes;

2.在主服务器上正向、反向文件中增加从服务器的NS记录
正向区域

@       NS      dns2
dns2    A       192.168.2.104

反向区域

IN      NS      dns2.magedu.com.
104      IN      PTR     dns2.magedu.com.

3.复制主服务器上配置文件至从服务器

#scp 192.168.1.72:/etc/named.rfc1912.zones /etc/#scp 192.168.1.72:/etc/named.conf /etc/

4.修改从服务器上/etc/named.rfc1912.zones

zone "magedu.com" IN {type slave;masters { 192.168.2.72; };file "magedu.com.zone";
};zone "2.168.192.in-addr.arpa" IN {type slave;masters { 192.168.2.72; };file "2.168.192.zone";
};

5.启动从服务器DNS服务,查看日志,及/var/named/目录下是否已同步成功主服务器区域文件

增量区域传送

1.修改主服务器正向解析文件,增加一条A记录,==将序列号加1==后保存退出
2.reload主DNS服务器,查看日志
主服务器日志:

Jan 20 02:12:55 agent named[35582]: zone 2.168.192.in-addr.arpa/IN: sending notifies (serial 2019011301)
Jan 20 02:12:55 agent named[35582]: client 192.168.2.104#39669 (magedu.com): transfer of 'magedu.com/IN': AXFR-style IXFR started
Jan 20 02:12:55 agent named[35582]: client 192.168.2.104#39669 (magedu.com): transfer of 'magedu.com/IN': AXFR-style IXFR ended
Jan 20 02:12:56 agent named[35582]: client 192.168.2.104#34346: received notify for zone 'magedu.com'

从服务器日志:

Jan 20 03:02:25 zabbix named[100773]: client 192.168.2.72#60290: received notify for zone 'magedu.com'
Jan 20 03:02:25 zabbix named[100773]: zone magedu.com/IN: Transfer started.
Jan 20 03:02:25 zabbix named[100773]: transfer of 'magedu.com/IN' from 192.168.2.72#53: connected using 192.168.2.104#39669
Jan 20 03:02:25 zabbix named[100773]: zone magedu.com/IN: transferred serial 2019012001
Jan 20 03:02:25 zabbix named[100773]: transfer of 'magedu.com/IN' from 192.168.2.72#53: Transfer completed: 1 messages, 10 records, 268 bytes, 0.001 secs (268000 bytes/sec)
Jan 20 03:02:25 zabbix named[100773]: zone magedu.com/IN: sending notifies (serial 2019012001)
Jan 20 03:02:25 zabbix named[100773]: client 192.168.2.72#4595: received notify for zone '2.168.192.in-addr.arpa'
Jan 20 03:02:25 zabbix named[100773]: zone 2.168.192.in-addr.arpa/IN: notify from 192.168.2.72#4595: zone is up to date

3.在反向解析文件增加一条PTR记录,同样序列号加1
主DNS服务器日志:

Jan 20 02:17:44 agent named[35582]: zone 2.168.192.in-addr.arpa/IN: sending notifies (serial 2019012001)
Jan 20 02:17:44 agent named[35582]: client 192.168.2.104#57041 (2.168.192.in-addr.arpa): transfer of '2.168.192.in-addr.arpa/IN': AXFR-style IXFR started
Jan 20 02:17:44 agent named[35582]: client 192.168.2.104#57041 (2.168.192.in-addr.arpa): transfer of '2.168.192.in-addr.arpa/IN': AXFR-style IXFR ended

从DNS服务器日志:

Jan 20 03:07:38 zabbix named[100773]: client 192.168.2.72#17270: received notify for zone '2.168.192.in-addr.arpa'
Jan 20 03:07:38 zabbix named[100773]: zone 2.168.192.in-addr.arpa/IN: Transfer started.
Jan 20 03:07:38 zabbix named[100773]: transfer of '2.168.192.in-addr.arpa/IN' from 192.168.2.72#53: connected using 192.168.2.104#57041
Jan 20 03:07:38 zabbix named[100773]: zone 2.168.192.in-addr.arpa/IN: transferred serial 2019012001
Jan 20 03:07:38 zabbix named[100773]: transfer of '2.168.192.in-addr.arpa/IN' from 192.168.2.72#53: Transfer completed: 1 messages, 8 records, 242 bytes, 0.001 secs (242000 bytes/sec)
Jan 20 03:07:38 zabbix named[100773]: zone 2.168.192.in-addr.arpa/IN: sending notifies (serial 2019012001)

4.通过dig命令验证

root@node2:~# dig -t A ftp.magedu.com @192.168.2.104; <<>> DiG 9.11.3-1ubuntu1.2-Ubuntu <<>> -t A ftp.magedu.com @192.168.2.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2878
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 3;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ftp.magedu.com.            IN  A;; ANSWER SECTION:
ftp.magedu.com.     600 IN  A   192.168.2.1;; AUTHORITY SECTION:
magedu.com.     600 IN  NS  dns2.magedu.com.
magedu.com.     600 IN  NS  dns1.magedu.com.;; ADDITIONAL SECTION:
dns1.magedu.com.    600 IN  A   192.168.2.72
dns2.magedu.com.    600 IN  A   192.168.2.104;; Query time: 5 msec
;; SERVER: 192.168.2.104#53(192.168.2.104)
;; WHEN: Sun Jan 20 15:19:47 CST 2019
;; MSG SIZE  rcvd: 129

测试通过从服务器反向解析

root@node2:~# dig -x 192.168.2.1  @192.168.2.104; <<>> DiG 9.11.3-1ubuntu1.2-Ubuntu <<>> -x 192.168.2.1 @192.168.2.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14837
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 3;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.2.168.192.in-addr.arpa.  IN  PTR;; ANSWER SECTION:
1.2.168.192.in-addr.arpa. 600   IN  PTR ftp.magedu.com.;; AUTHORITY SECTION:
2.168.192.in-addr.arpa. 600 IN  NS  dns1.magedu.com.
2.168.192.in-addr.arpa. 600 IN  NS  dns2.magedu.com.;; ADDITIONAL SECTION:
dns1.magedu.com.    600 IN  A   192.168.2.72
dns2.magedu.com.    600 IN  A   192.168.2.104;; Query time: 2 msec
;; SERVER: 192.168.2.104#53(192.168.2.104)
;; WHEN: Sun Jan 20 15:24:38 CST 2019
;; MSG SIZE  rcvd: 151

DNS子域授权

当一个域很大时,而且还有上下层关系,如果所有的记录变更都由某一台服务来管理的话会很不方便。因此DNS也会域和子域,上层DNS可以将子域的管理授权给子域中的NDS服务器来管理记录的变更,这种做法叫子域授权。

子域授权配置

规划如下:
父域为:magedu.com
NS地址:ns1.magedu.com
子域为:dev.magedu.com
NS地址为:ns1.dev.magedu.com

父域服务器配置

只需在区域解析库文件中添加下层DNS服务器的NS与A记录即可

dev.magedu.com. NS      dns1.dev.magedu.com.
dns1.dev.magedu.com.    A       192.168.2.165

子域服务器配置

子域需要有完整的区域相关配置
在/etc/named.rfc1912.zones中加入子域定义

zone "dev.magedu.com" IN {type master;file "dev.magedu.com.zone";
};

创建dev.magedu.com.zone区域解析文件

$TTL 600
@       IN      SOA     dns1.dev.magedu.com.    admin.dev.magedu.com. (2019012002;2H;15M;1W;1D);
@       IN      NS      dns1
dns1    IN      A       192.168.2.165
www     IN      A       192.168.2.18

在子域DNS服务器添加指向父域的转发器

//将查询父域的请求转发给父域DNS
zone "magedu.com" IN {type forward;forward only;forwarders { 192.168.2.72; };
};

配置完成重启服务。
通过dig命令测试解析结果:

通过子域解析 www.dev.magedu.com

root@node2:~# dig -t A www.dev.magedu.com @192.168.2.165; <<>> DiG 9.11.3-1ubuntu1.2-Ubuntu <<>> -t A www.dev.magedu.com @192.168.2.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36922
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.dev.magedu.com.        IN  A;; ANSWER SECTION:
www.dev.magedu.com. 600 IN  A   192.168.2.18;; AUTHORITY SECTION:
dev.magedu.com.     600 IN  NS  dns1.dev.magedu.com.;; ADDITIONAL SECTION:
dns1.dev.magedu.com.    600 IN  A   192.168.2.165;; Query time: 17 msec
;; SERVER: 192.168.2.165#53(192.168.2.165)
;; WHEN: Sun Jan 20 16:09:31 CST

通过父域解析 www.dev.magedu.com

root@node2:~# dig -t A www.dev.magedu.com @192.168.2.72; <<>> DiG 9.11.3-1ubuntu1.2-Ubuntu <<>> -t A www.dev.magedu.com @192.168.2.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61135
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.dev.magedu.com.        IN  A;; ANSWER SECTION:
www.dev.magedu.com. 600 IN  A   192.168.2.18;; AUTHORITY SECTION:
dev.magedu.com.     600 IN  NS  dns1.dev.magedu.com.;; Query time: 318 msec
;; SERVER: 192.168.2.72#53(192.168.2.72)
;; WHEN: Sun Jan 20 16:19:13 CST 2019
;; MSG SIZE  rcvd: 82

通过子域DNS服务器解析父域的A记录

root@node2:~# dig -t A www.magedu.com @192.168.2.165; <<>> DiG 9.11.3-1ubuntu1.2-Ubuntu <<>> -t A www.magedu.com @192.168.2.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47969
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 13, ADDITIONAL: 27;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.magedu.com.            IN  A;; ANSWER SECTION:
www.magedu.com.     301 IN  CNAME   web.magedu.com.
web.magedu.com.     301 IN  A   192.168.2.21;; Query time: 2 msec
;; SERVER: 192.168.2.165#53(192.168.2.165)
;; WHEN: Sun Jan 20 16:21:30 CST 2019
;; MSG SIZE  rcvd: 873

转载于:https://www.cnblogs.com/feng-land/p/10295306.html

与50位技术专家面对面20年技术见证,附赠技术全景图

Published by

风君子

独自遨游何稽首 揭天掀地慰生平

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注