bind 不能反向解析
named.conf 配置文件options {
listen-on port53 { any; };
directory "/var/named";
};
zone "." IN {
type hint;
file "named.ca";
};
zone "localhost" IN {
type master;
file "named.localhost";
};
zone "1.0.0.127.in-addr.arpa" IN {
type master;
file "named.loopback";
};
zone "jszj.com" IN {
type master;
file "jszj.zone";
};
zone "2.168.192.in-aadr.arpa" IN {
type master;
file "192.168.2.zone";
};
正向配置文件
$TTL 3600
@ IN SOA ns1.jszj.com. root.jszj.com. (
2014070601
1H
10M
2W
2D )
@ IN NS ns1.jszj.com.
@ IN MX 10 mail.jszj.com.
ns1 IN A 192.168.2.107
www IN A 192.168.2.107
mail IN A 192.168.2.107
ftp IN A 192.168.2.108
fireware IN A 192.168.2.107
反向配置文件
$TTL 1D
@ IN SOAns1.jszj.com rname.invalid. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
INNS ns1.jszj.com.
107 INPTR ns1.jszj.com
107 INPTR mail.jszj.com
报错
# dig -x 192.168.2.107
; <<>> DiG 9.7.0-P2-RedHat-9.7.0-17.P2.el5_9.2 <<>> -x 192.168.2.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.2.168.192.in-addr.arpa. IN PTR
;; AUTHORITY SECTION:
168.192.in-addr.arpa. 10800 IN SOA prisoner.iana.org. hostmaster.root-servers.org. 1 604800 60 604800 604800
;; Query time: 4105 msec
;; SERVER: 192.168.2.107#53(192.168.2.107)
;; WHEN: Sun Jul 13 18:31:15 2014
;; MSG SIZErcvd: 121
报错的日志
Jul 13 18:26:03 fireware named: zone 2.168.192.in-aadr.arpa/IN: sending notifies (serial 0)
Jul 13 18:26:09 fireware named: client 192.168.2.107#32791: RFC 1918 response from Internet for 107.2.168.192.in-addr.arpa
Jul 13 18:26:10 fireware named: success resolving 'r.arin.net/A' (in 'arin.net'?) after reducing the advertised EDNS UDP packet size to 512 octets
Jul 13 18:26:10 fireware named: success resolving 't.arin.net/A' (in 'arin.net'?) after reducing the advertised EDNS UDP packet size to 512 octets
Jul 13 18:26:11 fireware named: success resolving 'w.arin.net/A' (in 'arin.net'?) after reducing the advertised EDNS UDP packet size to 512 octets
Jul 13 18:26:11 fireware named: success resolving 'z.arin.net/A' (in 'arin.net'?) after reducing the advertised EDNS UDP packet size to 512 octets
Jul 13 18:26:11 fireware named: success resolving 'x.arin.net/A' (in 'arin.net'?) after reducing the advertised EDNS UDP packet size to 512 octets
Jul 13 18:26:11 fireware named: success resolving 'u.arin.net/A' (in 'arin.net'?) after disabling EDNS
Jul 13 18:26:12 fireware named: success resolving 'y.arin.net/A' (in 'arin.net'?) after disabling EDNS
Jul 13 18:26:14 fireware named: success resolving 'v.arin.net/A' (in 'arin.net'?) after disabling EDNS :lol帮顶:lol 本帖最后由 gotovenice 于 2014-07-14 13:16 编辑
zone "2.168.192.in-aadr.arpa" IN {
这个拼写错了吧 是的啊,看你上面的是拼写错了,
你dns启动时,应该有错误日志的。 用 named-checkzone检查一下配置文件,根据错误提示,修改 没有错误提示
谢谢 gotovenice!! 是区域文件 写错了一个单词。谢谢!
页:
[1]