这篇文章主要为大家展示了“怎么使用unbound在RHEL7上搭建DNS”,内容简而易懂,条理清晰,希望能够帮助大家解决疑惑,下面让小编带领大家一起研究并学习一下“怎么使用unbound在RHEL7上搭建DNS”这篇文章吧。
DNS( Domain Name System)是“域名系统”的英文缩写,是一种组织成域层次结构的计算机和网络服务命名系统,使用的是UDP协议的53号端口,它用于TCP/IP网络,它所提供的服务是用来将主机名和域名转换为IP地址的工作
DNS安装配置:
在RHEL5、6中dns都是用的是bind软件包,而在RHEL/centos7用的是unbound安装包,配置文件也有了改变。我们来看一下:
安装:yum -y install unbound (先配置yum仓库)
[root@linuxprobe ~]# yum -y install unboundLoaded plugins: langpacks, product-id, subscription-manager This system is not registered to Red Hat Subscription Management. You can use subscription-manager to register. Resolving Dependencies ---> Running transaction check ---> Package unbound.x86_64 0:1.4.20-19.el7 will be installed ---> Finished Dependency Resolution ····· ---------------------------启动服务----------------------------- [root@linuxprobe ~]# systemctl restart unbound //启动DNS服务[root@linuxprobe ~]# systemctl enable unboundln -s ‘/usr/lib/systemd/system/unbound.service‘ ‘/etc/systemd/system/multi-user.target.wants/unbound.service‘ //下次系统重启自动启动DNS服务
修改配置文件:
unbound安装好之后,缺省配置文件在/etc/unbound/unbound.conf.
修改端口监听地址(相当于RHEL6配置文件中的:listen-on port 53 { any; };)
-----------------------查看默认监听地址-------------------------- [root@linuxprobe ~]# netstat -tunlp |grep unboundtcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 3333/unbound tcp 0 0 127.0.0.1:8953 0.0.0.0:* LISTEN 3333/unbound tcp6 0 0 ::1:53 :::* LISTEN 3333/unbound tcp6 0 0 ::1:8953 :::* LISTEN 3333/unbound udp 0 0 127.0.0.1:53 0.0.0.0:* 3333/unbound udp6 0 0 ::1:53 :::* 3333/unbound //默认监听本地回环地址,也就是现在只有自己能访问DNS服务,其它主机不能访问本机的DNS服务 -------------------------修改监听地址---------------------------- [root@linuxprobe ~]# vim /etc/unbound/unbound.conf…… 38 # interface: 0.0.0.039 interface: 0.0.0.0 …… //找到38行,复制去掉注释行,打开监听全网功能。 --------------------------重启服务查看-------------------------------- [root@linuxprobe ~]# systemctl restart unbound[root@linuxprobe ~]# netstat -tunlp |grep unboundtcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3461/unbound tcp 0 0 127.0.0.1:8953 0.0.0.0:* LISTEN 3461/unbound tcp6 0 0 ::1:8953 :::* LISTEN 3461/unbound udp 0 0 0.0.0.0:53 0.0.0.0:* 3461/unbound //现在53号端口监听的是0.0.0.0,即所有网段都监听。
修改允许查询的范围: 在RHEL6中,DNS配置文件中有这样一句:allow-query { localhost; };。此句定义的是允许向本机查询(迭代&递归)的主机范围,localhost代表只有本机可以向本机查询。而在配置中,经常改localhost为any,让所有主机能够向本机查询DNS。所以,在RHEL7中,也要做这样的修改,只不过修改内容不同而已,如下:
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf…… 177 # access-control: 0.0.0.0/0 refuse178 access-control: 0.0.0.0/0 allow 179 # access-control: 127.0.0.0/8 allow…… 找到配置文件/etc/unbound/unbound.conf的第177行,缺省为注释行,把内容改为允许访问,然后保存退出,重启服务即可。
创建解析文件: RHEL/centos 5、6系统中,DNS的解析文件分正向和反向两个解析文件,并且有解析文件的模板文件。但是在RHEL7中,正反向解析文件合并为一个,并且无模板文件,需自己创建,路径可以在主配置文件中查看:
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf…… 453 # You can add locally served data with454 # local-zone: "local." static455 # local-data: "mycomputer.local. IN A 192.0.2.51" //正向解析可参考语法 456 # local-data: ‘mytext.local TXT "content of text record"‘457 #458 # You can override certain queries with459 # local-data: "adserver.example.com A 127.0.0.1"460 #461 # You can redirect a domain to a fixed address with462 # (this makes example.com, www.example.com, etc, all go to 192.0.2.3)463 # local-zone: "example.com" redirect464 # local-data: "example.com A 192.0.2.3"465 ## Shorthand to make PTR records, "IPv4 name" or "IPv6 name".467 # You can also add PTR records using local-data directly, but then468 # you need to do the reverse notation yourself.469 # local-data-ptr: "192.0.2.3 www.example.com" //反向解析参考语法 470 471 include: /etc/unbound/local.d/*.conf 472 473 # service clients over SSL (on the TCP sockets), with plain DNS inside…… ---------------------------------查看本机FQDN--------------------------- [root@linuxprobe ~]# hostnamelinuxprobe.example.com //由此可知,域名为example.com --------------------------------创建解析文件----------------------------- [root@linuxprobe ~]# vim /etc/unbound/local.d/example.conflocal-zone: "example.com." staticlocal-data: "example.com. 86400 IN SOA ns.example.com. root 1 1D 1H 1W 1H"local-data: "ns.example.com. IN A 192.168.10.10"local-data: "linuxprobe.example.com. IN A 192.168.10.10"local-data-ptr: "192.168.10.10 ns.example.com."local-data-ptr: "192.168.10.10 linuxprobe.example.com."------------------------查看RHEL6上解析文件以作对比-------------------- [root@linuxprobe ~]# vim /var/named/named.localhost$TTL 1D @ IN SOA @ rname.invalid. ( 0 ; serial 1D ; refresh 1H ; retry 1W ; expire 3H ) ; minimum NS @ A 127.0.0.1 AAAA ::1
禁用服务用户:
每个服务都是有其专用的服务用户,DNS的服务用户为unbound,实际情况下服务用户的启用有可能有安全隐患,这里要即禁用服务用户。
[root@linuxprobe ~]# vim /etc/unbound/unbound.conf······ 211 # if given, user privileges are dropped (after binding port),212 # and the given username is assumed. Default is user "unbound".213 # If you give "" no privileges are dropped.214 #username: "unbound"215 username: " "216 217 # the working directory. The relative files in this config······ 如上,找到配置文件的第214行,删除unbound即可,删除后为:username ” “。
验证:
[root@linuxprobe ~]# unbound-checkconfunbound-checkconf: no errors in /etc/unbound/unbound.conf 验证无配置问题,即可重启服务 [root@linuxprobe ~]# systemctl restart unbounddns验证: -------------------------修改本机DNS------------------------ [root@linuxprobe ~]# vim /etc/sysconfig/network-scripts/ifcfg-eth0HWADDR=00:0C:29:70:···· TYPE=Ethernet ···· IPADDR="192.168.10.10"PREFIX="24"··· DNS1=192.168.10.10 NAME=eth0 ONBOOT=no [root@linuxprobe ~]# systemctl restart network----------------------------------------------------nslookup验证-------------------------------------------- [root@linuxprobe ~]# nslookuplinuxprobe.example.com. 192.168.10.10 ok dns设置成功
PS:关闭防火墙
在本次实验中我们关闭了linux的3大防火墙。当没有关闭防火墙时,远程主机验证可能出现故障,这时需要在DNS服务器防火墙上开放DNS服务。我们以firewall防火墙为例,修改一下:
[root@linuxprobe ~]# systemctl stop iptables[root@linuxprobe ~]# systemctl stop ebtables[root@linuxprobe ~]# systemctl disable iptables[root@linuxprobe ~]# systemctl disable ebtables[root@linuxprobe ~]# firewall-cmd --add-service=dns --permanentsuccess [root@linuxprobe ~]# firewall-cmd --reloadsuccess [root@linuxprobe ~]# firewall-cmd --list-allpublic (default, active) interfaces: eth0 sources: services: dhcpv6-client dns ssh ports: masquerade: no forward-ports: icmp-blocks: rich rules: //DNS服务器上Firewall开放DNS访问ok