I have a situation where I need to filter out our private infrastructure from 
our public-facing DNS servers. This is certainly something that should have 
been done a long time ago, but I just recently took over the spot. Now, I've 
seen plenty of examples using views and separate zonefiles, but what I can't 
find are examples of the same domain zone-xfering both zonefiles.

 

Our DNS infrastructure is large and the configuration varies from server type 
to server type. Some are configured to be the primary auth servers - facing the 
Internet. Others are public-facing, but accessed only by customer devices, and 
still others service our internal systems. I would like to get us down to just 
1 set of configuration files across the board, using views as the way to do it, 
but what I can't get around are split zone transfers.

 

In this example, we have a straightforward example of a split zone:

view "trusted" {
 match-clients { 192.168.23.0/24; }; // our network
  recursion yes;
  // other view statements as required
  zone "example.com" {
   type master;
   // private zone file including local hosts
   file "internal/master.example.com 
<http://www.zytrax.com/books/dns/ch6/mydomain-internal.html> ";
  };
  // add required zones
 };
view "badguys" {
 match-clients {"any"; }; // all other hosts
 // recursion not supported
 recursion no;
 // other view statements as required
 zone "example.com" {
   type master;
   // public only hosts
   file "external/master.example.com 
<http://www.zytrax.com/books/dns/ch6/mydomain-external.html> ";
  };
  // add required zones
 };

 

Now, what I would like to have are slave servers that would zone-xfer both the 
internal and external-flavored files for example.com and serve them using the 
same view structure. The hidden masters can generate the split zone files based 
on private IP address ranges, but I see no way to  use zone transfers to get 
both types of files replicated to the many slave servers that I would need to 
get them to.

 

This obviously won't work, but this is what I'm after from a logical sense.

 

view "trusted" {
 match-clients { 192.168.23.0/24; }; // our network
  recursion yes;
  // other view statements as required
  zone "example.com" {
   type slave;
    masters = { 1.2.3.4, 4.5.6.7 };
   // private zone file including local hosts
   file "internal/master.example.com 
<http://www.zytrax.com/books/dns/ch6/mydomain-internal.html> ";
  };
  // add required zones
 };
view "badguys" {
 match-clients {"any"; }; // all other hosts
 // recursion not supported
 recursion no;
 // other view statements as required
 zone "example.com" {
   type slave;
    masters = { 1.2.3.4, 4.5.6.7 };
   // public only hosts
   file "external/master.example.com 
<http://www.zytrax.com/books/dns/ch6/mydomain-external.html> ";
  };
  // add required zones
 };

 

I suppose I could set up another pair of hidden masters to serve up the 
internal zones, or another pair of IP addrs on the masters, but I'm hoping not 
to go down that road.

 

Thanks,

 

Eric Chandler

Systems Architect

 

 

23 Main Street, Holmdel, NJ 07733

(: 732.203.7437

(: 732.284.8504 (iPhone)

*: eric.chand...@vonage.com <mailto:eric.chand...@vonage.com>  

รพ: www.vonage.com <http://www.vonage.com/> 

 

 

NOTE: The information contained in this email message is considered 
confidential and proprietary to the sender and is intended solely 

for review and use by the named recipient.  Any unauthorized review, use or 
distribution is strictly prohibited. If you have received this

message in error, please advise the sender by reply email and delete the message

 

<<image001.gif>>

<<image002.jpg>>

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to