1*00b67f09SDavid van Moolenbroek; -*- zone -*- 2*00b67f09SDavid van Moolenbroek; this was generated by a Samba4 provision, and is typical 3*00b67f09SDavid van Moolenbroek; of a AD DNS zone 4*00b67f09SDavid van Moolenbroek$ORIGIN example.nil. 5*00b67f09SDavid van Moolenbroek$TTL 1W 6*00b67f09SDavid van Moolenbroek@ IN SOA blu hostmaster ( 7*00b67f09SDavid van Moolenbroek 2010113027 ; serial 8*00b67f09SDavid van Moolenbroek 2D ; refresh 9*00b67f09SDavid van Moolenbroek 4H ; retry 10*00b67f09SDavid van Moolenbroek 6W ; expiry 11*00b67f09SDavid van Moolenbroek 1W ) ; minimum 12*00b67f09SDavid van Moolenbroek IN NS blu 13*00b67f09SDavid van Moolenbroek 14*00b67f09SDavid van Moolenbroek IN A 10.53.0.1 15*00b67f09SDavid van Moolenbroek; 16*00b67f09SDavid van Moolenbroek 17*00b67f09SDavid van Moolenbroekblu IN A 10.53.0.1 18*00b67f09SDavid van Moolenbroekgc._msdcs IN A 10.53.0.1 19*00b67f09SDavid van Moolenbroek 20*00b67f09SDavid van Moolenbroekfb33eb58-5d58-4100-a114-256e0a97ffc1._msdcs IN CNAME blu 21*00b67f09SDavid van Moolenbroek; 22*00b67f09SDavid van Moolenbroek; global catalog servers 23*00b67f09SDavid van Moolenbroek_gc._tcp IN SRV 0 100 3268 blu 24*00b67f09SDavid van Moolenbroek_gc._tcp.Default-First-Site-Name._sites IN SRV 0 100 3268 blu 25*00b67f09SDavid van Moolenbroek_ldap._tcp.gc._msdcs IN SRV 0 100 3268 blu 26*00b67f09SDavid van Moolenbroek_ldap._tcp.Default-First-Site-Name._sites.gc._msdcs IN SRV 0 100 3268 blu 27*00b67f09SDavid van Moolenbroek; 28*00b67f09SDavid van Moolenbroek; ldap servers 29*00b67f09SDavid van Moolenbroek_ldap._tcp IN SRV 0 100 389 blu 30*00b67f09SDavid van Moolenbroek_ldap._tcp.dc._msdcs IN SRV 0 100 389 blu 31*00b67f09SDavid van Moolenbroek_ldap._tcp.pdc._msdcs IN SRV 0 100 389 blu 32*00b67f09SDavid van Moolenbroek_ldap._tcp.d86745b4-f3e0-4af3-be03-2130d1534be8.domains._msdcs IN SRV 0 100 389 blu 33*00b67f09SDavid van Moolenbroek_ldap._tcp.Default-First-Site-Name._sites IN SRV 0 100 389 blu 34*00b67f09SDavid van Moolenbroek_ldap._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 389 blu 35*00b67f09SDavid van Moolenbroek; 36*00b67f09SDavid van Moolenbroek; krb5 servers 37*00b67f09SDavid van Moolenbroek_kerberos._tcp IN SRV 0 100 88 blu 38*00b67f09SDavid van Moolenbroek_kerberos._tcp.dc._msdcs IN SRV 0 100 88 blu 39*00b67f09SDavid van Moolenbroek_kerberos._tcp.Default-First-Site-Name._sites IN SRV 0 100 88 blu 40*00b67f09SDavid van Moolenbroek_kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 88 blu 41*00b67f09SDavid van Moolenbroek_kerberos._udp IN SRV 0 100 88 blu 42*00b67f09SDavid van Moolenbroek; MIT kpasswd likes to lookup this name on password change 43*00b67f09SDavid van Moolenbroek_kerberos-master._tcp IN SRV 0 100 88 blu 44*00b67f09SDavid van Moolenbroek_kerberos-master._udp IN SRV 0 100 88 blu 45*00b67f09SDavid van Moolenbroek; 46*00b67f09SDavid van Moolenbroek; kpasswd 47*00b67f09SDavid van Moolenbroek_kpasswd._tcp IN SRV 0 100 464 blu 48*00b67f09SDavid van Moolenbroek_kpasswd._udp IN SRV 0 100 464 blu 49*00b67f09SDavid van Moolenbroek; 50*00b67f09SDavid van Moolenbroek; heimdal 'find realm for host' hack 51*00b67f09SDavid van Moolenbroek_kerberos IN TXT EXAMPLE.NIL 52