summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorChristian Ruppert <idl0r@gentoo.org>2010-12-03 18:06:24 +0000
committerChristian Ruppert <idl0r@gentoo.org>2010-12-03 18:06:24 +0000
commit97bdeb30fa026bbf78665ac9343601bc69633f73 (patch)
treee6aedf96285759f5dad47af128276a530c553087 /net-dns/bind
parentMarked ~x64-macos (diff)
downloadgentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.tar.gz
gentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.tar.bz2
gentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.zip
Bump named-conf. Now without views again to not confuse users.
(Portage version: 2.2.0_alpha6/cvs/Linux x86_64)
Diffstat (limited to 'net-dns/bind')
-rw-r--r--net-dns/bind/ChangeLog11
-rw-r--r--net-dns/bind/bind-9.4.3_p5-r3.ebuild (renamed from net-dns/bind/bind-9.4.3_p5-r2.ebuild)4
-rw-r--r--net-dns/bind/bind-9.6.2_p3-r1.ebuild (renamed from net-dns/bind/bind-9.6.2_p3.ebuild)4
-rw-r--r--net-dns/bind/bind-9.7.2_p3-r1.ebuild (renamed from net-dns/bind/bind-9.7.2_p3.ebuild)4
-rw-r--r--net-dns/bind/files/named.conf-r5165
5 files changed, 181 insertions, 7 deletions
diff --git a/net-dns/bind/ChangeLog b/net-dns/bind/ChangeLog
index c25fb469f99e..ac02b8e9bee3 100644
--- a/net-dns/bind/ChangeLog
+++ b/net-dns/bind/ChangeLog
@@ -1,6 +1,15 @@
# ChangeLog for net-dns/bind
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/ChangeLog,v 1.298 2010/12/02 17:56:06 idl0r Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/ChangeLog,v 1.299 2010/12/03 18:06:24 idl0r Exp $
+
+*bind-9.7.2_p3-r1 (03 Dec 2010)
+*bind-9.6.2_p3-r1 (03 Dec 2010)
+*bind-9.4.3_p5-r3 (03 Dec 2010)
+
+ 03 Dec 2010; Christian Ruppert <idl0r@gentoo.org> -bind-9.4.3_p5-r2.ebuild,
+ +bind-9.4.3_p5-r3.ebuild, -bind-9.6.2_p3.ebuild, +bind-9.6.2_p3-r1.ebuild,
+ -bind-9.7.2_p3.ebuild, +bind-9.7.2_p3-r1.ebuild, +files/named.conf-r5:
+ Bump named-conf. Now without views again to not confuse users.
02 Dec 2010; Christian Ruppert <idl0r@gentoo.org> bind-9.6.2_p3.ebuild,
bind-9.7.2_p3.ebuild:
diff --git a/net-dns/bind/bind-9.4.3_p5-r2.ebuild b/net-dns/bind/bind-9.4.3_p5-r3.ebuild
index a0bcb4d173a4..c5e281b88c09 100644
--- a/net-dns/bind/bind-9.4.3_p5-r2.ebuild
+++ b/net-dns/bind/bind-9.4.3_p5-r3.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2010 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.4.3_p5-r2.ebuild,v 1.1 2010/10/24 20:47:16 idl0r Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.4.3_p5-r3.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $
EAPI="3"
@@ -187,7 +187,7 @@ src_install() {
fi
insinto /etc/bind
- newins "${FILESDIR}"/named.conf-r4 named.conf || die
+ newins "${FILESDIR}"/named.conf-r5 named.conf || die
# ftp://ftp.rs.internic.net/domain/named.cache:
insinto /var/bind
diff --git a/net-dns/bind/bind-9.6.2_p3.ebuild b/net-dns/bind/bind-9.6.2_p3-r1.ebuild
index eb4c27033380..5e7ae6bbee53 100644
--- a/net-dns/bind/bind-9.6.2_p3.ebuild
+++ b/net-dns/bind/bind-9.6.2_p3-r1.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2010 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.6.2_p3.ebuild,v 1.2 2010/12/02 17:56:06 idl0r Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.6.2_p3-r1.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $
EAPI="3"
@@ -213,7 +213,7 @@ src_install() {
use geoip && dodoc "${DISTDIR}"/${GEOIP_P}-readme.txt
insinto /etc/bind
- newins "${FILESDIR}"/named.conf-r4 named.conf || die
+ newins "${FILESDIR}"/named.conf-r5 named.conf || die
# ftp://ftp.rs.internic.net/domain/named.cache:
insinto /var/bind
diff --git a/net-dns/bind/bind-9.7.2_p3.ebuild b/net-dns/bind/bind-9.7.2_p3-r1.ebuild
index c1a47ce6f457..babee1ea573d 100644
--- a/net-dns/bind/bind-9.7.2_p3.ebuild
+++ b/net-dns/bind/bind-9.7.2_p3-r1.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2010 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.7.2_p3.ebuild,v 1.2 2010/12/02 17:56:06 idl0r Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.7.2_p3-r1.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $
EAPI="3"
@@ -202,7 +202,7 @@ src_install() {
use geoip && dodoc "${DISTDIR}"/${GEOIP_P}-readme.txt
insinto /etc/bind
- newins "${FILESDIR}"/named.conf-r4 named.conf || die
+ newins "${FILESDIR}"/named.conf-r5 named.conf || die
# ftp://ftp.rs.internic.net/domain/named.cache:
insinto /var/bind
diff --git a/net-dns/bind/files/named.conf-r5 b/net-dns/bind/files/named.conf-r5
new file mode 100644
index 000000000000..20dfa7999470
--- /dev/null
+++ b/net-dns/bind/files/named.conf-r5
@@ -0,0 +1,165 @@
+/*
+ * Refer to the named.conf(5) and named(8) man pages, and the documentation
+ * in /usr/share/doc/bind-9 for more details.
+ * Online versions of the documentation can be found here:
+ * http://www.isc.org/software/bind/documentation
+ *
+ * If you are going to set up an authoritative server, make sure you
+ * understand the hairy details of how DNS works. Even with simple mistakes,
+ * you can break connectivity for affected parties, or cause huge amounts of
+ * useless Internet traffic.
+ */
+
+acl "xfer" {
+ /* Deny transfers by default except for the listed hosts.
+ * If we have other name servers, place them here.
+ */
+ none;
+};
+
+/*
+ * You might put in here some ips which are allowed to use the cache or
+ * recursive queries
+ */
+acl "trusted" {
+ 127.0.0.0/8;
+ ::1/128;
+};
+
+options {
+ directory "/var/bind";
+ pid-file "/var/run/named/named.pid";
+
+ /* https://www.isc.org/solutions/dlv >=bind-9.7.x only */
+ //bindkeys-file "/etc/bind/bind.keys";
+
+ listen-on-v6 { ::1; };
+ listen-on { 127.0.0.1; };
+
+ allow-query {
+ /*
+ * Accept queries from our "trusted" ACL. We will
+ * allow anyone to query our master zones below.
+ * This prevents us from becoming a free DNS server
+ * to the masses.
+ */
+ trusted;
+ };
+
+ allow-query-cache {
+ /* Use the cache for the "trusted" ACL. */
+ trusted;
+ };
+
+ allow-recursion {
+ /* Only trusted addresses are allowed to use recursion. */
+ trusted;
+ };
+
+ allow-transfer {
+ /* Zone tranfers are denied by default. */
+ none;
+ };
+
+ allow-update {
+ /* Don't allow updates, e.g. via nsupdate. */
+ none;
+ };
+
+ /*
+ * If you've got a DNS server around at your upstream provider, enter its
+ * IP address here, and enable the line below. This will make you benefit
+ * from its cache, thus reduce overall DNS traffic in the Internet.
+ *
+ * Uncomment the following lines to turn on DNS forwarding, and change
+ * and/or update the forwarding ip address(es):
+ */
+/*
+ forward first;
+ forwarders {
+ // 123.123.123.123; // Your ISP NS
+ // 124.124.124.124; // Your ISP NS
+ // 4.2.2.1; // Level3 Public DNS
+ // 4.2.2.2; // Level3 Public DNS
+ 8.8.8.8; // Google Open DNS
+ 8.8.4.4; // Google Open DNS
+ };
+
+*/
+
+ //dnssec-enable yes;
+ //dnssec-validation yes;
+
+ /* if you have problems and are behind a firewall: */
+ //query-source address * port 53;
+};
+
+/*
+logging {
+ channel default_log {
+ file "/var/log/named/named.log" versions 5 size 50M;
+ print-time yes;
+ print-severity yes;
+ print-category yes;
+ };
+
+ category default { default_log; };
+ category general { default_log; };
+};
+*/
+
+include "/etc/bind/rndc.key";
+controls {
+ inet 127.0.0.1 port 953 allow { 127.0.0.1/32; ::1/128; } keys { "rndc-key"; };
+};
+
+zone "." in {
+ type hint;
+ file "/var/bind/root.cache";
+};
+
+zone "localhost" IN {
+ type master;
+ file "pri/localhost.zone";
+ notify no;
+};
+
+zone "127.in-addr.arpa" IN {
+ type master;
+ file "pri/127.zone";
+ notify no;
+};
+
+/*
+ * Briefly, a zone which has been declared delegation-only will be effectively
+ * limited to containing NS RRs for subdomains, but no actual data beyond its
+ * own apex (for example, its SOA RR and apex NS RRset). This can be used to
+ * filter out "wildcard" or "synthesized" data from NAT boxes or from
+ * authoritative name servers whose undelegated (in-zone) data is of no
+ * interest.
+ * See http://www.isc.org/software/bind/delegation-only for more info
+ */
+
+//zone "COM" { type delegation-only; };
+//zone "NET" { type delegation-only; };
+
+//zone "YOUR-DOMAIN.TLD" {
+// type master;
+// file "/var/bind/pri/YOUR-DOMAIN.TLD.zone";
+// allow-query { any; };
+// allow-transfer { xfer; };
+//};
+
+//zone "YOUR-SLAVE.TLD" {
+// type slave;
+// file "/var/bind/sec/YOUR-SLAVE.TLD.zone";
+// masters { <MASTER>; };
+
+ /* Anybody is allowed to query but transfer should be controlled by the master. */
+// allow-query { any; };
+// allow-transfer { none; };
+
+ /* The master should be the only one who notifies the slaves, shouldn't it? */
+// allow-notify { <MASTER>; };
+// notify no;
+//};