1/* 2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC") 3 * 4 * SPDX-License-Identifier: MPL-2.0 5 * 6 * This Source Code Form is subject to the terms of the Mozilla Public 7 * License, v. 2.0. If a copy of the MPL was not distributed with this 8 * file, you can obtain one at https://mozilla.org/MPL/2.0/. 9 * 10 * See the COPYRIGHT file distributed with this work for additional 11 * information regarding copyright ownership. 12 */ 13 14// NS3 15 16options { 17 query-source address 10.53.0.3; 18 notify-source 10.53.0.3; 19 transfer-source 10.53.0.3; 20 port @PORT@; 21 pid-file "named.pid"; 22 listen-on { 10.53.0.3; }; 23 listen-on-v6 { none; }; 24 recursion no; 25 notify yes; 26 dnssec-validation yes; 27 session-keyfile "session.key"; 28 minimal-responses no; 29}; 30 31key rndc_key { 32 secret "1234abcd8765"; 33 algorithm @DEFAULT_HMAC@; 34}; 35 36controls { 37 inet 10.53.0.3 port @CONTROLPORT@ allow { any; } keys { rndc_key; }; 38}; 39 40zone "." { 41 type hint; 42 file "../../_common/root.hint"; 43}; 44 45zone "example" { 46 type secondary; 47 primaries { 10.53.0.2; }; 48 file "example.bk"; 49}; 50 51zone "secure.example" { 52 type primary; 53 file "secure.example.db.signed"; 54 allow-update { any; }; 55}; 56 57zone "bogus.example" { 58 type primary; 59 file "bogus.example.db.signed"; 60 allow-update { any; }; 61}; 62 63zone "badds.example" { 64 type primary; 65 file "badds.example.db.signed"; 66 allow-update { any; }; 67}; 68 69zone "dynamic.example" { 70 type primary; 71 file "dynamic.example.db.signed"; 72 allow-update { any; }; 73}; 74 75zone "insecure.example" { 76 type primary; 77 file "insecure.example.db"; 78 allow-update { any; }; 79}; 80 81zone "insecure2.example" { 82 type primary; 83 file "insecure2.example.db"; 84 allow-update { any; }; 85}; 86 87zone "insecure.nsec3.example" { 88 type primary; 89 file "insecure.nsec3.example.db"; 90 allow-update { any; }; 91}; 92 93zone "insecure.optout.example" { 94 type primary; 95 file "insecure.optout.example.db"; 96 allow-update { any; }; 97}; 98 99zone "keyless.example" { 100 type primary; 101 file "keyless.example.db.signed"; 102}; 103 104zone "nsec3.example" { 105 type primary; 106 file "nsec3.example.db.signed"; 107}; 108 109zone "optout.nsec3.example" { 110 type primary; 111 file "optout.nsec3.example.db.signed"; 112}; 113 114zone "nsec3.nsec3.example" { 115 type primary; 116 file "nsec3.nsec3.example.db.signed"; 117}; 118 119zone "secure.nsec3.example" { 120 type primary; 121 file "secure.nsec3.example.db.signed"; 122}; 123 124zone "optout.example" { 125 type primary; 126 file "optout.example.db.signed"; 127}; 128 129zone "secure.optout.example" { 130 type primary; 131 file "secure.optout.example.db.signed"; 132}; 133 134zone "nsec3.optout.example" { 135 type primary; 136 file "nsec3.optout.example.db.signed"; 137}; 138 139zone "optout.optout.example" { 140 type primary; 141 file "optout.optout.example.db.signed"; 142}; 143 144zone "nsec3-unknown.example" { 145 type primary; 146 nsec3-test-zone yes; 147 file "nsec3-unknown.example.db.signed"; 148}; 149 150zone "optout-unknown.example" { 151 type primary; 152 nsec3-test-zone yes; 153 file "optout-unknown.example.db.signed"; 154}; 155 156zone "dnskey-unknown.example" { 157 type primary; 158 file "dnskey-unknown.example.db.signed"; 159}; 160 161zone "dnskey-unsupported.example" { 162 type primary; 163 file "dnskey-unsupported.example.db.signed"; 164}; 165 166zone "dnskey-unsupported-2.example" { 167 type primary; 168 file "dnskey-unsupported-2.example.db.signed"; 169}; 170 171zone "dnskey-nsec3-unknown.example" { 172 type primary; 173 nsec3-test-zone yes; 174 file "dnskey-nsec3-unknown.example.db.signed"; 175}; 176 177zone "multiple.example" { 178 type primary; 179 file "multiple.example.db.signed"; 180 allow-update { any; }; 181}; 182 183zone "rfc2335.example" { 184 type secondary; 185 primaries { 10.53.0.2; }; 186 file "rfc2335.example.bk"; 187}; 188 189zone "rsasha256.example" { 190 type primary; 191 file "rsasha256.example.db.signed"; 192}; 193 194zone "rsasha512.example" { 195 type primary; 196 file "rsasha512.example.db.signed"; 197}; 198 199zone "kskonly.example" { 200 type primary; 201 file "kskonly.example.db.signed"; 202}; 203 204zone "expired.example" { 205 type primary; 206 allow-update { none; }; 207 file "expired.example.db.signed"; 208}; 209 210zone "update-nsec3.example" { 211 type primary; 212 allow-update { any; }; 213 file "update-nsec3.example.db.signed"; 214}; 215 216zone "auto-nsec.example" { 217 type primary; 218 auto-dnssec maintain; 219 allow-update { !0.0.0.0; }; 220 file "auto-nsec.example.db.signed"; 221}; 222 223zone "auto-nsec3.example" { 224 type primary; 225 auto-dnssec maintain; 226 allow-update { !0.0.0.0; }; 227 file "auto-nsec3.example.db.signed"; 228}; 229 230zone "insecure.below-cname.example" { 231 type primary; 232 file "insecure.below-cname.example.db"; 233}; 234 235zone "secure.below-cname.example" { 236 type primary; 237 file "secure.below-cname.example.db.signed"; 238}; 239 240zone "ttlpatch.example" { 241 type primary; 242 file "ttlpatch.example.db.patched"; 243}; 244 245zone "split-dnssec.example" { 246 type primary; 247 file "split-dnssec.example.db"; 248}; 249 250zone "split-smart.example" { 251 type primary; 252 file "split-smart.example.db"; 253}; 254 255zone "nsec3chain-test" { 256 type secondary; 257 file "nsec3chain-test.bk"; 258 primaries { 10.53.0.2; }; 259}; 260 261zone "expiring.example" { 262 type primary; 263 allow-update { any; }; 264 file "expiring.example.db.signed"; 265}; 266 267zone "nosign.example" { 268 type primary; 269 allow-update { any; }; 270 dnssec-update-mode no-resign; 271 file "nosign.example.db.signed"; 272}; 273 274zone "upper.example" { 275 type primary; 276 file "upper.example.db.signed"; 277}; 278 279zone "LOWER.EXAMPLE" { 280 type primary; 281 file "lower.example.db.signed"; 282}; 283 284zone "inline.example" { 285 type primary; 286 file "inline.example.db"; 287 inline-signing yes; 288 auto-dnssec maintain; 289}; 290 291zone "publish-inactive.example" { 292 type primary; 293 file "publish-inactive.example.db"; 294 auto-dnssec maintain; 295 dnssec-dnskey-kskonly no; 296 update-policy local; 297}; 298 299zone "future.example" { 300 type primary; 301 file "future.example.db.signed"; 302}; 303 304zone "managed-future.example" { 305 type primary; 306 file "managed-future.example.db.signed"; 307 allow-update { any; }; 308}; 309 310zone "revkey.example" { 311 type primary; 312 file "revkey.example.db.signed"; 313}; 314 315zone "dname-at-apex-nsec3.example" { 316 type primary; 317 file "dname-at-apex-nsec3.example.db.signed"; 318}; 319 320zone "occluded.example" { 321 type primary; 322 file "occluded.example.db.signed"; 323}; 324 325zone "secure.managed" { 326 type primary; 327 file "secure.managed.db.signed"; 328}; 329 330zone "disabled.managed" { 331 type primary; 332 file "disabled.managed.db.signed"; 333}; 334 335zone "enabled.managed" { 336 type primary; 337 file "enabled.managed.db.signed"; 338}; 339 340zone "unsupported.managed" { 341 type primary; 342 file "unsupported.managed.db.signed"; 343}; 344 345zone "revoked.managed" { 346 type primary; 347 file "revoked.managed.db.signed"; 348}; 349 350zone "secure.trusted" { 351 type primary; 352 file "secure.trusted.db.signed"; 353}; 354 355zone "disabled.trusted" { 356 type primary; 357 file "disabled.trusted.db.signed"; 358}; 359 360zone "enabled.trusted" { 361 type primary; 362 file "enabled.trusted.db.signed"; 363}; 364 365zone "unsupported.trusted" { 366 type primary; 367 file "unsupported.trusted.db.signed"; 368}; 369 370zone "revoked.trusted" { 371 type primary; 372 file "revoked.trusted.db.signed"; 373}; 374 375zone "too-many-iterations" { 376 type secondary; 377 primaries { 10.53.0.2; }; 378 file "too-many-iterations.bk"; 379}; 380 381include "siginterval.conf"; 382 383include "trusted.conf"; 384