这篇文章主要为大家展示了“怎么使用unbound在RHEL7上搭建DNS”,内容简而易懂,条理清晰,希望能够帮助大家解决疑惑,下面让小编带领大家一起研究并学习一下“怎么使用unbound在RHEL7上搭建DNS”这篇文章吧。
DNS( Domain Name System)是“域名系统”的英文缩写,是一种组织成域层次结构的计算机和网络服务命名系统,使用的是UDP协议的53号端口,它用于TCP/IP网络,它所提供的服务是用来将主机名和域名转换为IP地址的工作
DNS安装配置:
在RHEL5、6中dns都是用的是bind软件包,而在RHEL/centos7用的是unbound安装包,配置文件也有了改变。我们来看一下:
安装:yum -y install unbound (先配置yum仓库)
[root@linuxprobe ~]# yum -y install unboundLoaded plugins: langpacks, product-id, subscription-managerThis system is not registered to Red Hat Subscription Management. You can use subscription-manager to register.Resolving Dependencies---> Running transaction check---> Package unbound.x86_64 0:1.4.20-19.el7 will be installed---> Finished Dependency Resolution·····---------------------------启动服务-----------------------------[root@linuxprobe ~]# systemctl restart unbound //启动DNS服务[root@linuxprobe ~]# systemctl enable unboundln -s ‘/usr/lib/systemd/system/unbound.service‘ ‘/etc/systemd/system/multi-user.target.wants/unbound.service‘ //下次系统重启自动启动DNS服务
修改配置文件:
unbound安装好之后,缺省配置文件在/etc/unbound/unbound.conf.
修改端口监听地址(相当于RHEL6配置文件中的:listen-on port 53 { any; };)
-----------------------查看默认监听地址--------------------------[root@linuxprobe ~]# netstat -tunlp |grep unboundtcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 3333/unboundtcp 0 0 127.0.0.1:8953 0.0.0.0:* LISTEN 3333/unboundtcp6 0 0 ::1:53 :::* LISTEN 3333/unboundtcp6 0 0 ::1:8953 :::* LISTEN 3333/unboundudp 0 0 127.0.0.1:53 0.0.0.0:* 3333/unboundudp6 0 0 ::1:53 :::* 3333/unbound//默认监听本地回环地址,也就是现在只有自己能访问DNS服务,其它主机不能访问本机的DNS服务-------------------------修改监听地址----------------------------[root@linuxprobe ~]# vim /etc/unbound/unbound.conf……38 # interface: 0.0.0.039 interface: 0.0.0.0……//找到38行,复制去掉注释行,打开监听全网功能。--------------------------重启服务查看--------------------------------[root@linuxprobe ~]# systemctl restart unbound[root@linuxprobe ~]# netstat -tunlp |grep unboundtcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3461/unboundtcp 0 0 127.0.0.1:8953 0.0.0.0:* LISTEN 3461/unboundtcp6 0 0 ::1:8953 :::* LISTEN 3461/unboundudp 0 0 0.0.0.0:53 0.0.0.0:* 3461/unbound//现在53号端口监听的是0.0.0.0,即所有网段都监听。
修改允许查询的范围: 在RHEL6中,DNS配置文件中有这样一句:allow-query { localhost; };。此句定义的是允许向本机查询(迭代&递归)的主机范围,localhost代表只有本机可以向本机查询。而在配置中,经常改localhost为any,让所有主机能够向本机查询DNS。所以,在RHEL7中,也要做这样的修改,只不过修改内容不同而已,如下:
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf……177 # access-control: 0.0.0.0/0 refuse178 access-control: 0.0.0.0/0 allow179 # access-control: 127.0.0.0/8 allow……找到配置文件/etc/unbound/unbound.conf的第177行,缺省为注释行,把内容改为允许访问,然后保存退出,重启服务即可。
创建解析文件: RHEL/centos 5、6系统中,DNS的解析文件分正向和反向两个解析文件,并且有解析文件的模板文件。但是在RHEL7中,正反向解析文件合并为一个,并且无模板文件,需自己创建,路径可以在主配置文件中查看:
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf……453 # You can add locally served data with454 # local-zone: "local." static455 # local-data: "mycomputer.local. IN A 192.0.2.51" //正向解析可参考语法456 # local-data: ‘mytext.local TXT "content of text record"‘457 #458 # You can override certain queries with459 # local-data: "adserver.example.com A 127.0.0.1"460 #461 # You can redirect a domain to a fixed address with462 # (this makes example.com, www.example.com, etc, all go to 192.0.2.3)463 # local-zone: "example.com" redirect464 # local-data: "example.com A 192.0.2.3"465 ## Shorthand to make PTR records, "IPv4 name" or "IPv6 name".467 # You can also add PTR records using local-data directly, but then468 # you need to do the reverse notation yourself.469 # local-data-ptr: "192.0.2.3 www.example.com" //反向解析参考语法470471 include: /etc/unbound/local.d/*.conf472473 # service clients over SSL (on the TCP sockets), with plain DNS inside……---------------------------------查看本机FQDN---------------------------[root@linuxprobe ~]# hostnamelinuxprobe.example.com//由此可知,域名为example.com--------------------------------创建解析文件-----------------------------[root@linuxprobe ~]# vim /etc/unbound/local.d/example.conflocal-zone: "example.com." staticlocal-data: "example.com. 86400 IN SOA ns.example.com. root 1 1D 1H 1W 1H"local-data: "ns.example.com. IN A 192.168.10.10"local-data: "linuxprobe.example.com. IN A 192.168.10.10"local-data-ptr: "192.168.10.10 ns.example.com."local-data-ptr: "192.168.10.10 linuxprobe.example.com."------------------------查看RHEL6上解析文件以作对比--------------------[root@linuxprobe ~]# vim /var/named/named.localhost$TTL 1D @ IN SOA @ rname.invalid. ( 0 ; serial1D ; refresh1H ; retry1W ; expire3H ) ; minimumNS @A 127.0.0.1AAAA ::1
禁用服务用户:
每个服务都是有其专用的服务用户,DNS的服务用户为unbound,实际情况下服务用户的启用有可能有安全隐患,这里要即禁用服务用户。
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf······211 # if given, user privileges are dropped (after binding port),212 # and the given username is assumed. Default is user "unbound".213 # If you give "" no privileges are dropped.214 #username: "unbound"215 username: " "216217 # the working directory. The relative files in this config······如上,找到配置文件的第214行,删除unbound即可,删除后为:username ” “。
验证:
[root@linuxprobe ~]# unbound-checkconfunbound-checkconf: no errors in /etc/unbound/unbound.conf验证无配置问题,即可重启服务[root@linuxprobe ~]# systemctl restart unbounddns验证:-------------------------修改本机DNS------------------------[root@linuxprobe ~]# vim /etc/sysconfig/network-scripts/ifcfg-eth0HWADDR=00:0C:29:70:····TYPE=Ethernet····IPADDR="192.168.10.10"PREFIX="24"···DNS1=192.168.10.10NAME=eth0ONBOOT=no[root@linuxprobe ~]# systemctl restart network----------------------------------------------------nslookup验证--------------------------------------------[root@linuxprobe ~]# nslookuplinuxprobe.example.com.192.168.10.10ok dns设置成功
PS:关闭防火墙
在本次实验中我们关闭了linux的3大防火墙。当没有关闭防火墙时,远程主机验证可能出现故障,这时需要在DNS服务器防火墙上开放DNS服务。我们以firewall防火墙为例,修改一下:
[root@linuxprobe ~]# systemctl stop iptables[root@linuxprobe ~]# systemctl stop ebtables[root@linuxprobe ~]# systemctl disable iptables[root@linuxprobe ~]# systemctl disable ebtables[root@linuxprobe ~]# firewall-cmd --add-service=dns --permanentsuccess[root@linuxprobe ~]# firewall-cmd --reloadsuccess[root@linuxprobe ~]# firewall-cmd --list-allpublic (default, active)interfaces: eth0sources:services: dhcpv6-client dns sshports:masquerade: noforward-ports:icmp-blocks:rich rules://DNS服务器上Firewall开放DNS访问ok
以上是“怎么使用unbound在RHEL7上搭建DNS”这篇文章的所有内容,感谢各位的阅读!相信大家都有了一定的了解,希望分享的内容对大家有所帮助,如果还想学习更多知识,欢迎关注编程网行业资讯频道!