I know there are tons of topics already about dns. but i still cant make my dns working. i want to practice installing zimbra and
have it up and working. so i ended up testing FOSS edition.
i hope someone can help me or spot what im missing or did something wrong.
here is my setup.
*i am behind a router/modem - home setup/fiber connection dynamic public IP
*centos 7 installed on vmware
*zimbra ver 8.7.1
*hostname mail.networthsolutions.tech
*public IP - 49.145.171.0
*domain - networthsolutions.tech
*BIND version - BIND 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.3 (Extended Support Version) <id:7107deb>
* /etc/named.conf
Code: Select all
[root@mail ~]# clear
[root@mail ~]# cat /etc/named.conf
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
// See the BIND Administrator's Reference Manual (ARM) for details about the
// configuration located in /usr/share/doc/bind-{version}/Bv9ARM.html
options {
listen-on port 53 { 127.0.0.1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
recursing-file "/var/named/data/named.recursing";
secroots-file "/var/named/data/named.secroots";
allow-query { localhost; };
/*
- If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
- If you are building a RECURSIVE (caching) DNS server, you need to enable
recursion.
- If your recursive DNS server has a public IP address, you MUST enable access
control to limit queries to your legitimate users. Failing to do so will
cause your server to become part of large scale DNS amplification
attacks. Implementing BCP38 within your network would greatly
reduce such attack surface
*/
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
forwarders {
8.8.8.8;
8.8.4.4;
};
/* Path to ISC DLV key */
bindkeys-file "/etc/named.root.key";
managed-keys-directory "/var/named/dynamic";
pid-file "/run/named/named.pid";
session-keyfile "/run/named/session.key";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
zone "NETWORTHSOLUTIONS.TECH" IN {
type master;
file "NETWORTHSOLUTIONS.TECH";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
[root@mail ~]#
* /var/named/NETWORTHSOLUTIONS.TECH
Code: Select all
[root@mail ~]# clear
[root@mail ~]# cat /var/named/NETWORTHSOLUTIONS.TECH
$ORIGIN NETWORTHSOLUTIONS.TECH.
$TTL 38400
NETWORTHSOLUTIONS.TECH. IN SOA NS1 Administrator.NETWORTHSOLUTIONS.TECH (
2010022801 ; Serial
10800 ; Refresh
3600 ; Retry
604800 ; Expire
86400 ; Minimum
)
NETWORTHSOLUTIONS.TECH. IN NS ns1
ns1 IN A 8.8.8.8
NETWORTHSOLUTIONS.TECH. IN A 192.168.1.222
mail IN A 192.168.1.222
mail.NETWORTHSOLUTIONS.TECH. IN A 192.168.1.222
mail1.NETWORTHSOLUTIONS.TECH. IN A 192.168.1.222
webmail IN A 192.168.1.222
@ IN MX 10 mail
NETWORTHSOLUTIONS.TECH. IN MX 20 mail1
webmail.NETWORTHSOLUTIONS.TECH IN MX 30 mail
[root@mail ~]#
* /etc/resolv.conf
Code: Select all
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# clear
[root@mail ~]#
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# cat /etc/resolv.conf
# Generated by NetworkManager
search networthsolutions.tech
nameserver 192.168.1.222
nameserver 8.8.8.8
[root@mail ~]#
* /etc/hosts
Code: Select all
[root@mail ~]# clear
[root@mail ~]#
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
192.168.1.222 mail.networthsolutions.tech networthsolutions.tech
[root@mail ~]#
* dig networthsolutions.tech any
Code: Select all
[root@mail ~]# clear
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# dig networthsolutions.tech
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.3 <<>> networthsolutions.tech
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 7378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;networthsolutions.tech. IN A
;; AUTHORITY SECTION:
networthsolutions.tech. 1799 IN SOA ns1.dns-parking.com. dns.hostinger.com. 2021021307 10000 2400 604800 3600
;; Query time: 289 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sat Feb 13 14:21:12 PST 2021
;; MSG SIZE rcvd: 120
[root@mail ~]# dig networthsolutions.tech any
;; Connection to 192.168.1.222#53(192.168.1.222) for networthsolutions.tech failed: connection refused.
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.3 <<>> networthsolutions.tech any
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 350
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;networthsolutions.tech. IN ANY
;; ANSWER SECTION:
networthsolutions.tech. 3788 IN HINFO "RFC8482" ""
;; Query time: 66 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sat Feb 13 14:21:16 PST 2021
;; MSG SIZE rcvd: 72
[root@mail ~]#
* nmcli device show
Code: Select all
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# clear
[root@mail ~]#
[root@mail ~]#
[root@mail ~]# nmcli device show
GENERAL.DEVICE: ens33
GENERAL.TYPE: ethernet
GENERAL.HWADDR: 00:0C:29:5B:0E:11
GENERAL.MTU: 1500
GENERAL.STATE: 100 (connected)
GENERAL.CONNECTION: ens33
GENERAL.CON-PATH: /org/freedesktop/NetworkManager/ActiveConnection/1
WIRED-PROPERTIES.CARRIER: on
IP4.ADDRESS[1]: 192.168.1.222/24
IP4.GATEWAY: 192.168.1.1
IP4.ROUTE[1]: dst = 192.168.1.0/24, nh = 0.0.0.0, mt = 100
IP4.ROUTE[2]: dst = 0.0.0.0/0, nh = 192.168.1.1, mt = 100
IP4.DNS[1]: 192.168.1.222
IP4.DNS[2]: 8.8.8.8
IP6.ADDRESS[1]: fe80::548c:85da:7f45:1d70/64
IP6.GATEWAY: --
IP6.ROUTE[1]: dst = fe80::/64, nh = ::, mt = 100
IP6.ROUTE[2]: dst = ff00::/8, nh = ::, mt = 256, table=255
GENERAL.DEVICE: lo
GENERAL.TYPE: loopback
GENERAL.HWADDR: 00:00:00:00:00:00
GENERAL.MTU: 65536
GENERAL.STATE: 10 (unmanaged)
GENERAL.CONNECTION: --
GENERAL.CON-PATH: --
IP4.ADDRESS[1]: 127.0.0.1/8
IP4.GATEWAY: --
IP6.ADDRESS[1]: ::1/128
IP6.GATEWAY: --
[root@mail ~]#
* DNS Records