ben-dns/named.conf.local

201 lines
4.5 KiB
Plaintext

//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
// include "/etc/bind/zones.rfc1918";
acl internals {
127.0.0.1;
192.168.1.0/24;
};
include "/etc/bind/tilde_msT.key";
include "/etc/bind/certbot.key";
include "/etc/bind/club.key";
include "/etc/bind/bsd.tilde.team.key";
server 89.163.145.170 { keys { tilde_msT; }; }; // ns1.envs.net
server 78.31.64.115 { keys { tilde_msT; }; }; // ns2.envs.net
masters "notifylist" {
89.163.145.170;
78.31.64.115;
};
acl "transferto" {
key tilde_msT;
};
zone "tildeverse.net" {
type master;
file "/etc/bind/zones/db.tildeverse.net";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildeverse.net. txt;
};
};
zone "tildeverse.org" {
type master;
file "/etc/bind/zones/db.tildeverse.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildeverse.org. txt;
};
};
zone "fuckup.club" {
type master;
file "/etc/bind/zones/db.fuckup.club";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.fuckup.club. txt;
};
};
zone "nand.sh" {
type master;
file "/etc/bind/zones/db.nand.sh";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.nand.sh. txt;
};
};
zone "tild3.org" {
type master;
file "/etc/bind/zones/db.tild3.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tild3.org. txt;
};
};
zone "tilde.chat" {
type master;
file "/etc/bind/zones/db.tilde.chat";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.chat. txt;
};
};
zone "tildegit.org" {
type master;
file "/etc/bind/zones/db.tildegit.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildegit.org. txt;
};
};
zone "tilde.news" {
type master;
file "/etc/bind/zones/db.tilde.news";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.news. txt;
};
};
zone "tilderadio.org" {
type master;
file "/etc/bind/zones/db.tilderadio.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilderadio.org. txt;
};
};
zone "tilde.site" {
type master;
file "/etc/bind/zones/db.tilde.site";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.site. txt;
};
};
zone "tilde.team" {
type master;
file "/etc/bind/zones/db.tilde.team";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.team. txt;
grant bsd.tilde.team name _acme-challenge.bsd.tilde.team. txt;
};
};
zone "tildeteam.org" {
type master;
file "/etc/bind/zones/db.tildeteam.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildeteam.org. txt;
};
};
zone "tildeteam.net" {
type master;
file "/etc/bind/zones/db.tildeteam.net";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildeteam.net. txt;
};
};
zone "tilde.wiki" {
type master;
file "/etc/bind/zones/db.tilde.wiki";
allow-transfer { transferto; heslave; };
also-notify { "notifylist"; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.wiki. txt;
};
};
zone "tilde.zone" {
type master;
file "/etc/bind/zones/db.tilde.zone";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tilde.zone. txt;
};
};
zone "ttm.sh" {
type master;
file "/etc/bind/zones/db.ttm.sh";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.ttm.sh. txt;
};
};
zone "tildepages.org" {
type master;
file "/etc/bind/zones/db.tildepages.org";
allow-transfer { transferto; heslave; };
also-notify { notifylist; he1; };
update-policy {
grant certbot name _acme-challenge.tildepages.org. txt;
};
};