D就是區域
N就是名字
S就是服務
DNS四種服務
1.緩存域名服務器
幫你去找域名解析,本身並不能解析
去公網找真正的域名服務器,去要域名解析,要回來以后,放到自己的緩存里它在給你,你在請求同樣的數據它就有了2.主域名解析服務器
也就是他自己維護一個域名的解析記錄本3.從域名解析服務器(主的備份)
4.智能解析服務器
兩種解析記錄
1.正向解析記錄
域名===>IP
(1)A記錄就是把域名變成IP
(2)Cname別名解析2.反向解析記錄
IP===>域名
(1)PTR反向解析
DNS兩種查詢方式
1.遞歸查詢
不需要求助別人的服務叫做遞歸查詢2.迭代查詢
需求求助別人的服務叫做迭代查詢
全世界13給點(.)域名服務器,那么www.baidu.com這個域名里也有點這個東西,因此LDNS先去求助點域名服務器
DNS端口號
DNS端口號:53
DNS緩存服務搭建
准備工作
rpm -qa | grep -w bind bind-chroot ===>需要安裝2個軟件包
主配置文件
vim /etc/named.conf ===>DNS主配置文件(安裝完軟件包就有主配置文件)
options {listen-on port 53 { 192.168.200.67; };// listen-on-v6 port 53 { ::1; };directory "/var/named";dump-file "/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";allow-query { any; };recursion yes;dnssec-enable no;dnssec-validation no;// dnssec-lookaside auto;/* Path to ISC DLV key */bindkeys-file "/etc/named.iscdlv.key";managed-keys-directory "/var/named/dynamic";};logging {channel default_debug {file "data/named.run";severity dynamic;};};zone "." IN {type hint;file "named.ca";};include "/etc/named.rfc1912.zones";include "/etc/named.root.key";
主配置文件詳解
options {listen-on port 53 { 192.168.200.67; }; ===>監聽IP地址listen-on-v6 port 53 { ::1; }; ===>注釋掉,在DNS配置文件//代表注釋directory "/var/named"; ===>DNS目錄位置dump-file "/var/named/data/cache_dump.db"; ===>DNS數據文件位置memstatistics-file "/var/named/data/named_mem_stats.txt"; ===>DNS緩存數據文件位置allow-query { any; }; ===>允許連接我的IP地址范圍,any代表允許所有人forwarders { 202.106.0.20; }; ===>告訴去找哪個域名,可寫可不寫recursion yes; ===>是否迭代查詢dnssec-enable no; ===>改成NOdnssec-validation no; ===>改成NOdnssec-lookaside auto; ===>一些驗證,注釋掉zone "." IN {type hint;file "named.ca"; ===>代表去點域名找
核對DNS服務端主配置文件是否錯誤
named-checkconf /etc/named.conf ===>核對不提示任何信息代表成功
etc/init.d/named start ===>啟動DNS服務
netstat -antup | grep 53 ===>查詢端口是否開啟
DNS客戶端臨時配置文件
vim /etc/resolv.conf
nameserver 192.168.200.67 ===>臨時修改服務器配置跟DNS主配置文件IP一樣,重啟網卡自然被原先的文件覆蓋
ping www.baidu.com ===>ping一下檢查服務是否正確,卡是正常,因為是在找點域名
DNS主域名解析服務搭建
准備工作
rpm -qa | grep -w bind bind-chroot ===>需要安裝2個軟件包
正向解析配置文件
vim /etc/named.conf ===>DNS主配置文件===>DNS主配置文件(安裝完軟件包就有主配置文件)
options {listen-on port 53 { 192.168.200.67; };// listen-on-v6 port 53 { ::1; };directory "/var/named";dump-file "/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";allow-query { any; };forwarders { 202.106.0.20; };recursion yes;// dnssec-enable no;// dnssec-validation no;// dnssec-lookaside auto;/* Path to ISC DLV key */bindkeys-file "/etc/named.iscdlv.key";managed-keys-directory "/var/named/dynamic";};logging {channel default_debug {file "data/named.run";severity dynamic;};};zone "yunjisuan.com" IN {type master;file "yunjisuan.com.zone";};zone "." IN {type hint;file "named.ca";};include "/etc/named.rfc1912.zones";include "/etc/named.root.key";配置詳解listen-on port 53 { 192.168.200.67; }; ===>監聽IP地址listen-on-v6 port 53 { ::1; }; ===>注釋掉,在DNS配置文件//代表注釋directory "/var/named"; ===>DNS目錄位置dump-file "/var/named/data/cache_dump.db"; ===>DNS數據文件位置memstatistics-file "/var/named/data/named_mem_stats.txt"; ===>DNS緩存數據文件位置allow-query { any; }; ===>允許連接我的IP地址范圍,any代表允許所有人forwarders { 202.106.0.20; }; ===>告訴去找哪個域名recursion yes; ===>是否迭代查詢dnssec-enable no; ===>注釋掉dnssec-validation no; ===>注釋掉dnssec-lookaside auto; ===>注釋掉zone "yunjisuan.com" IN { ===>代表區域文件,正向解析zone "." IN { ===>代表去點域名找正向解析記錄本文件
cd /var/named/named.empty ===>記錄本文件
cp -p named.empty yunjisuan.com.zone ===>完全復制記錄本文件各項屬性
$TTL 3H@ IN SOA yunjisuan.com. root.ns1.yunjisuan.com. (20181022 ; serial1D ; refresh1H ; retry1W ; expire3H ) ; minimumNS ns1.yunjisuan.com.ns1 A 192.168.200.67www A 192.168.200.2news A 192.168.200.1bbs CNAME news* A 192.168.200.68配置詳解$TTL 3H ===>時間周期yunjisuan.com. root.ns1.yunjisuan.com. ===>解析文件是以點結尾20181022 ; serial ===>當前日期,也是比對日期NS ns1.yunjisuan.com. ===>解析服務器的位置ns1 A 192.168.200.66 ===>當前解析記錄IPbbs CNAME news ===>別名記錄,bbs跟news是一個IP* A 192.168.200.68 ===>其他的所有找輸入的IP地址核對正向解析DNS服務端主配置文件是否錯誤
named-checkzone yunjisuan.com yunjisuan.com.zone ===>核對提示OK代表成功
/etc/init.d/named start ===>啟動DNS服務
DNS客戶端臨時配置文件
vim /etc/resolv.conf
nameserver 192.168.200.67 ===>臨時修改服務器配置跟DNS主配置文件IP一樣,重啟網卡自然被原先的文件覆蓋
ping www.yunjisuan.com ===>ping一下檢查服務是否正確,卡是正常,因為是在找點域名
ping ns1.yunjisuan.com ===>ping一下檢查服務是否正確,卡是正常,
准備工作
rpm -qa | grep -w bind bind-chroot ===>需要安裝2個軟件包
反向解析配置文件
vim /etc/named.conf ===>DNS主配置文件===>DNS主配置文件(安裝完軟件包就有主配置文件)
options {listen-on port 53 { 192.168.200.67; };// listen-on-v6 port 53 { ::1; };directory "/var/named";dump-file "/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";allow-query { any; };forwarders { 202.106.0.20; };recursion yes;// dnssec-enable no;// dnssec-validation no;// dnssec-lookaside auto;/* Path to ISC DLV key */bindkeys-file "/etc/named.iscdlv.key";managed-keys-directory "/var/named/dynamic";};logging {channel default_debug {file "data/named.run";severity dynamic;};};zone "202.168.192.inaddr.arpa" IN {type master;file "192.168.200.arpa";};zone "." IN {type hint;file "named.ca";};include "/etc/named.rfc1912.zones";include "/etc/named.root.key";配置詳解listen-on port 53 { 192.168.200.67; }; ===>監聽IP地址listen-on-v6 port 53 { ::1; }; ===>注釋掉,在DNS配置文件//代表注釋directory "/var/named"; ===>DNS目錄位置dump-file "/var/named/data/cache_dump.db"; ===>DNS數據文件位置memstatistics-file "/var/named/data/named_mem_stats.txt"; ===>DNS緩存數據文件位置allow-query { any; }; ===>允許連接我的IP地址范圍,any代表允許所有人forwarders { 202.106.0.20; }; ===>告訴去找哪個域名recursion yes; ===>是否迭代查詢dnssec-enable no; ===>注釋掉dnssec-validation no; ===>注釋掉dnssec-lookaside auto; ===>注釋掉zone "200.168.192.inaddr.arpa" IN { ===>代表區域文件,反向解析zone "." IN { ===>代表去點域名找反向解析記錄本文件
cd /var/named/named.empty ===>記錄本文件
cp -p named.empty 192.168.200.arpa ===>完全復制記錄本文件各項屬性
$TTL 3H@ IN SOA yunjisuan.com. root.ns1.yunjisuan.com. (20181022 ; serial1D ; refresh1H ; retry1W ; expire3H ) ; minimumNS ns1.yunjisuan.com.2 PTR www.yunjisuan.com.67 PTR ns1.yunjisuan.com.配置詳解$TTL 3H ===>時間周期yunjisuan.com. root.ns1.yunjisuan.com. ( ===>解析文件是以點結尾20181022 ; serial ===>當前日期,也是比對日期NS ns1.yunjisuan.com. ===>解析服務器的位置PTR www.yunjisuan.com. ===>已知IP反推域名,PTR反向解析DNS反向解析客戶端臨時配置文件
yum -y install bind-utils ===>安裝完軟件包就有nslookup命令
which nslookup
vim /etc/resolv.conf
nameserver 192.168.200.67 ===>臨時修改服務器配置跟DNS主配置文件IP一樣,重啟網卡自然被原先的文件覆蓋
nslookup www.yunjisuan.com ===>反向解析為了追蹤黑客位置
nslookup ns1.yunjisuan.com
nslookup 192.168.200.67






