diff options
author | Christian Ruppert <idl0r@gentoo.org> | 2010-12-03 18:06:24 +0000 |
---|---|---|
committer | Christian Ruppert <idl0r@gentoo.org> | 2010-12-03 18:06:24 +0000 |
commit | 97bdeb30fa026bbf78665ac9343601bc69633f73 (patch) | |
tree | e6aedf96285759f5dad47af128276a530c553087 /net-dns/bind | |
parent | Marked ~x64-macos (diff) | |
download | gentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.tar.gz gentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.tar.bz2 gentoo-2-97bdeb30fa026bbf78665ac9343601bc69633f73.zip |
Bump named-conf. Now without views again to not confuse users.
(Portage version: 2.2.0_alpha6/cvs/Linux x86_64)
Diffstat (limited to 'net-dns/bind')
-rw-r--r-- | net-dns/bind/ChangeLog | 11 | ||||
-rw-r--r-- | net-dns/bind/bind-9.4.3_p5-r3.ebuild (renamed from net-dns/bind/bind-9.4.3_p5-r2.ebuild) | 4 | ||||
-rw-r--r-- | net-dns/bind/bind-9.6.2_p3-r1.ebuild (renamed from net-dns/bind/bind-9.6.2_p3.ebuild) | 4 | ||||
-rw-r--r-- | net-dns/bind/bind-9.7.2_p3-r1.ebuild (renamed from net-dns/bind/bind-9.7.2_p3.ebuild) | 4 | ||||
-rw-r--r-- | net-dns/bind/files/named.conf-r5 | 165 |
5 files changed, 181 insertions, 7 deletions
diff --git a/net-dns/bind/ChangeLog b/net-dns/bind/ChangeLog index c25fb469f99e..ac02b8e9bee3 100644 --- a/net-dns/bind/ChangeLog +++ b/net-dns/bind/ChangeLog @@ -1,6 +1,15 @@ # ChangeLog for net-dns/bind # Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/ChangeLog,v 1.298 2010/12/02 17:56:06 idl0r Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/ChangeLog,v 1.299 2010/12/03 18:06:24 idl0r Exp $ + +*bind-9.7.2_p3-r1 (03 Dec 2010) +*bind-9.6.2_p3-r1 (03 Dec 2010) +*bind-9.4.3_p5-r3 (03 Dec 2010) + + 03 Dec 2010; Christian Ruppert <idl0r@gentoo.org> -bind-9.4.3_p5-r2.ebuild, + +bind-9.4.3_p5-r3.ebuild, -bind-9.6.2_p3.ebuild, +bind-9.6.2_p3-r1.ebuild, + -bind-9.7.2_p3.ebuild, +bind-9.7.2_p3-r1.ebuild, +files/named.conf-r5: + Bump named-conf. Now without views again to not confuse users. 02 Dec 2010; Christian Ruppert <idl0r@gentoo.org> bind-9.6.2_p3.ebuild, bind-9.7.2_p3.ebuild: diff --git a/net-dns/bind/bind-9.4.3_p5-r2.ebuild b/net-dns/bind/bind-9.4.3_p5-r3.ebuild index a0bcb4d173a4..c5e281b88c09 100644 --- a/net-dns/bind/bind-9.4.3_p5-r2.ebuild +++ b/net-dns/bind/bind-9.4.3_p5-r3.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2010 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.4.3_p5-r2.ebuild,v 1.1 2010/10/24 20:47:16 idl0r Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.4.3_p5-r3.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $ EAPI="3" @@ -187,7 +187,7 @@ src_install() { fi insinto /etc/bind - newins "${FILESDIR}"/named.conf-r4 named.conf || die + newins "${FILESDIR}"/named.conf-r5 named.conf || die # ftp://ftp.rs.internic.net/domain/named.cache: insinto /var/bind diff --git a/net-dns/bind/bind-9.6.2_p3.ebuild b/net-dns/bind/bind-9.6.2_p3-r1.ebuild index eb4c27033380..5e7ae6bbee53 100644 --- a/net-dns/bind/bind-9.6.2_p3.ebuild +++ b/net-dns/bind/bind-9.6.2_p3-r1.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2010 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.6.2_p3.ebuild,v 1.2 2010/12/02 17:56:06 idl0r Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.6.2_p3-r1.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $ EAPI="3" @@ -213,7 +213,7 @@ src_install() { use geoip && dodoc "${DISTDIR}"/${GEOIP_P}-readme.txt insinto /etc/bind - newins "${FILESDIR}"/named.conf-r4 named.conf || die + newins "${FILESDIR}"/named.conf-r5 named.conf || die # ftp://ftp.rs.internic.net/domain/named.cache: insinto /var/bind diff --git a/net-dns/bind/bind-9.7.2_p3.ebuild b/net-dns/bind/bind-9.7.2_p3-r1.ebuild index c1a47ce6f457..babee1ea573d 100644 --- a/net-dns/bind/bind-9.7.2_p3.ebuild +++ b/net-dns/bind/bind-9.7.2_p3-r1.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2010 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.7.2_p3.ebuild,v 1.2 2010/12/02 17:56:06 idl0r Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-dns/bind/bind-9.7.2_p3-r1.ebuild,v 1.1 2010/12/03 18:06:24 idl0r Exp $ EAPI="3" @@ -202,7 +202,7 @@ src_install() { use geoip && dodoc "${DISTDIR}"/${GEOIP_P}-readme.txt insinto /etc/bind - newins "${FILESDIR}"/named.conf-r4 named.conf || die + newins "${FILESDIR}"/named.conf-r5 named.conf || die # ftp://ftp.rs.internic.net/domain/named.cache: insinto /var/bind diff --git a/net-dns/bind/files/named.conf-r5 b/net-dns/bind/files/named.conf-r5 new file mode 100644 index 000000000000..20dfa7999470 --- /dev/null +++ b/net-dns/bind/files/named.conf-r5 @@ -0,0 +1,165 @@ +/* + * Refer to the named.conf(5) and named(8) man pages, and the documentation + * in /usr/share/doc/bind-9 for more details. + * Online versions of the documentation can be found here: + * http://www.isc.org/software/bind/documentation + * + * If you are going to set up an authoritative server, make sure you + * understand the hairy details of how DNS works. Even with simple mistakes, + * you can break connectivity for affected parties, or cause huge amounts of + * useless Internet traffic. + */ + +acl "xfer" { + /* Deny transfers by default except for the listed hosts. + * If we have other name servers, place them here. + */ + none; +}; + +/* + * You might put in here some ips which are allowed to use the cache or + * recursive queries + */ +acl "trusted" { + 127.0.0.0/8; + ::1/128; +}; + +options { + directory "/var/bind"; + pid-file "/var/run/named/named.pid"; + + /* https://www.isc.org/solutions/dlv >=bind-9.7.x only */ + //bindkeys-file "/etc/bind/bind.keys"; + + listen-on-v6 { ::1; }; + listen-on { 127.0.0.1; }; + + allow-query { + /* + * Accept queries from our "trusted" ACL. We will + * allow anyone to query our master zones below. + * This prevents us from becoming a free DNS server + * to the masses. + */ + trusted; + }; + + allow-query-cache { + /* Use the cache for the "trusted" ACL. */ + trusted; + }; + + allow-recursion { + /* Only trusted addresses are allowed to use recursion. */ + trusted; + }; + + allow-transfer { + /* Zone tranfers are denied by default. */ + none; + }; + + allow-update { + /* Don't allow updates, e.g. via nsupdate. */ + none; + }; + + /* + * If you've got a DNS server around at your upstream provider, enter its + * IP address here, and enable the line below. This will make you benefit + * from its cache, thus reduce overall DNS traffic in the Internet. + * + * Uncomment the following lines to turn on DNS forwarding, and change + * and/or update the forwarding ip address(es): + */ +/* + forward first; + forwarders { + // 123.123.123.123; // Your ISP NS + // 124.124.124.124; // Your ISP NS + // 4.2.2.1; // Level3 Public DNS + // 4.2.2.2; // Level3 Public DNS + 8.8.8.8; // Google Open DNS + 8.8.4.4; // Google Open DNS + }; + +*/ + + //dnssec-enable yes; + //dnssec-validation yes; + + /* if you have problems and are behind a firewall: */ + //query-source address * port 53; +}; + +/* +logging { + channel default_log { + file "/var/log/named/named.log" versions 5 size 50M; + print-time yes; + print-severity yes; + print-category yes; + }; + + category default { default_log; }; + category general { default_log; }; +}; +*/ + +include "/etc/bind/rndc.key"; +controls { + inet 127.0.0.1 port 953 allow { 127.0.0.1/32; ::1/128; } keys { "rndc-key"; }; +}; + +zone "." in { + type hint; + file "/var/bind/root.cache"; +}; + +zone "localhost" IN { + type master; + file "pri/localhost.zone"; + notify no; +}; + +zone "127.in-addr.arpa" IN { + type master; + file "pri/127.zone"; + notify no; +}; + +/* + * Briefly, a zone which has been declared delegation-only will be effectively + * limited to containing NS RRs for subdomains, but no actual data beyond its + * own apex (for example, its SOA RR and apex NS RRset). This can be used to + * filter out "wildcard" or "synthesized" data from NAT boxes or from + * authoritative name servers whose undelegated (in-zone) data is of no + * interest. + * See http://www.isc.org/software/bind/delegation-only for more info + */ + +//zone "COM" { type delegation-only; }; +//zone "NET" { type delegation-only; }; + +//zone "YOUR-DOMAIN.TLD" { +// type master; +// file "/var/bind/pri/YOUR-DOMAIN.TLD.zone"; +// allow-query { any; }; +// allow-transfer { xfer; }; +//}; + +//zone "YOUR-SLAVE.TLD" { +// type slave; +// file "/var/bind/sec/YOUR-SLAVE.TLD.zone"; +// masters { <MASTER>; }; + + /* Anybody is allowed to query but transfer should be controlled by the master. */ +// allow-query { any; }; +// allow-transfer { none; }; + + /* The master should be the only one who notifies the slaves, shouldn't it? */ +// allow-notify { <MASTER>; }; +// notify no; +//}; |