ben-dns/named.conf.local

233 lines
5.0 KiB
Plaintext

//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
// include "/etc/bind/zones.rfc1918";
acl internals {
127.0.0.1;
192.168.1.0/24;
};
include "/etc/bind/tilde_msT.key";
include "/etc/bind/certbot.key";
include "/etc/bind/club.key";
include "/etc/bind/bsd.tilde.team.key";
server 89.163.145.170 { keys { tilde_msT; }; }; // ns1.envs.net
server 78.31.64.115 { keys { tilde_msT; }; }; // ns2.envs.net
masters "notifylist" {
167.114.154.31;
89.163.145.170;
78.31.64.115;
};
acl "transferto" {
167.114.154.31;
key tilde_msT;
};
zone "tildeverse.net" {
type master;
file "/etc/bind/zones/db.tildeverse.net";
also-notify { "notifylist"; };
allow-transfer { "transferto";};
update-policy {
grant certbot name _acme-challenge.tildeverse.net. txt;
};
};
zone "tildeverse.org" {
type master;
file "/etc/bind/zones/db.tildeverse.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tildeverse.org. txt;
};
};
zone "fuckup.club" {
type master;
file "/etc/bind/zones/db.fuckup.club";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.fuckup.club. txt;
};
};
zone "nand.sh" {
type master;
file "/etc/bind/zones/db.nand.sh";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.nand.sh. txt;
};
};
zone "tild3.org" {
type master;
file "/etc/bind/zones/db.tild3.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tild3.org. txt;
};
};
zone "tilde.chat" {
type master;
file "/etc/bind/zones/db.tilde.chat";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.chat. txt;
};
};
zone "tildegit.org" {
type master;
file "/etc/bind/zones/db.tildegit.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tildegit.org. txt;
};
};
zone "tilde.life" {
type master;
file "/etc/bind/zones/db.tilde.life";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.life. txt;
};
};
zone "tildenet.org" {
type master;
file "/etc/bind/zones/db.tildenet.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tildenet.org. txt;
};
};
zone "tilde.news" {
type master;
file "/etc/bind/zones/db.tilde.news";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.news. txt;
};
};
zone "tilde.ninja" {
type master;
file "/etc/bind/zones/db.tilde.ninja";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.ninja. txt;
};
};
zone "tilde.pizza" {
type master;
file "/etc/bind/zones/db.tilde.pizza";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.pizza. txt;
};
};
zone "tilderadio.org" {
type master;
file "/etc/bind/zones/db.tilderadio.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilderadio.org. txt;
};
};
zone "tilde.site" {
type master;
file "/etc/bind/zones/db.tilde.site";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.site. txt;
};
};
zone "tilde.team" {
type master;
file "/etc/bind/zones/db.tilde.team";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.team. txt;
grant bsd.tilde.team name _acme-challenge.bsd.tilde.team. txt;
};
};
zone "tildeteam.org" {
type master;
file "/etc/bind/zones/db.tildeteam.org";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tildeteam.org. txt;
};
};
zone "tildeteam.net" {
type master;
file "/etc/bind/zones/db.tildeteam.net";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tildeteam.net. txt;
};
};
zone "tilde.wiki" {
type master;
file "/etc/bind/zones/db.tilde.wiki";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.wiki. txt;
};
};
zone "tilde.zone" {
type master;
file "/etc/bind/zones/db.tilde.zone";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.tilde.zone. txt;
};
};
zone "ttm.sh" {
type master;
file "/etc/bind/zones/db.ttm.sh";
allow-transfer { "transferto"; };
also-notify { "notifylist"; };
update-policy {
grant certbot name _acme-challenge.ttm.sh. txt;
};
};