// // Do any local configuration here // // Consider adding the 1918 zones here, if they are not used in your // organization // include "/etc/bind/zones.rfc1918"; acl internals { 127.0.0.1; 192.168.1.0/24; }; include "/etc/bind/tilde_msT.key"; include "/etc/bind/certbot.key"; include "/etc/bind/club.key"; include "/etc/bind/bsd.tilde.team.key"; server 89.163.145.170 { keys { tilde_msT; }; }; // ns1.envs.net server 78.31.64.115 { keys { tilde_msT; }; }; // ns2.envs.net masters "notifylist" { 167.114.154.31; 89.163.145.170; 78.31.64.115; }; acl "transferto" { 167.114.154.31; key tilde_msT; }; zone "xn--tild-y6b.net" { type master; file "/etc/bind/zones/db.xn--tild-y6b.net"; also-notify { "notifylist"; }; allow-transfer { "transferto";}; update-policy { grant certbot name _acme-challenge.xn--tild-y6b.net. txt; }; }; zone "tildeverse.net" { type master; file "/etc/bind/zones/db.tildeverse.net"; also-notify { "notifylist"; }; allow-transfer { "transferto";}; update-policy { grant certbot name _acme-challenge.tildeverse.net. txt; }; }; zone "tildeverse.org" { type master; file "/etc/bind/zones/db.tildeverse.org"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tildeverse.org. txt; }; }; zone "fuckup.club" { type master; file "/etc/bind/zones/db.fuckup.club"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.fuckup.club. txt; }; }; zone "nand.sh" { type master; file "/etc/bind/zones/db.nand.sh"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.nand.sh. txt; }; }; zone "tild3.org" { type master; file "/etc/bind/zones/db.tild3.org"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tild3.org. txt; }; }; zone "tilde.chat" { type master; file "/etc/bind/zones/db.tilde.chat"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.chat. txt; }; }; zone "tildegit.org" { type master; file "/etc/bind/zones/db.tildegit.org"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tildegit.org. txt; }; }; zone "tilde.life" { type master; file "/etc/bind/zones/db.tilde.life"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.life. txt; }; }; zone "tilde.news" { type master; file "/etc/bind/zones/db.tilde.news"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.news. txt; }; }; zone "tilderadio.org" { type master; file "/etc/bind/zones/db.tilderadio.org"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilderadio.org. txt; }; }; zone "tilde.site" { type master; file "/etc/bind/zones/db.tilde.site"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.site. txt; }; }; zone "tilde.team" { type master; file "/etc/bind/zones/db.tilde.team"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.team. txt; grant bsd.tilde.team name _acme-challenge.bsd.tilde.team. txt; }; }; zone "tildeteam.org" { type master; file "/etc/bind/zones/db.tildeteam.org"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tildeteam.org. txt; }; }; zone "tildeteam.net" { type master; file "/etc/bind/zones/db.tildeteam.net"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tildeteam.net. txt; }; }; zone "tilde.wiki" { type master; file "/etc/bind/zones/db.tilde.wiki"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.wiki. txt; }; }; zone "tilde.zone" { type master; file "/etc/bind/zones/db.tilde.zone"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.tilde.zone. txt; }; }; zone "ttm.sh" { type master; file "/etc/bind/zones/db.ttm.sh"; allow-transfer { "transferto"; }; also-notify { "notifylist"; }; update-policy { grant certbot name _acme-challenge.ttm.sh. txt; }; };