commit:     4a40ba1f34667420516f8d1e49f041d251dcd074
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Thu May 29 19:14:23 2025 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Thu May 29 19:14:23 2025 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4a40ba1f

net-dns/bind: drop 'dnssec-enable' from 9.20.7 config

(Revbumped in earlier commit for libsystemd fix.)

Closes: https://bugs.gentoo.org/956804
Signed-off-by: Sam James <sam <AT> gentoo.org>

 net-dns/bind/bind-9.20.7-r2.ebuild |   2 +-
 net-dns/bind/files/named.conf-r9   | 165 +++++++++++++++++++++++++++++++++++++
 2 files changed, 166 insertions(+), 1 deletion(-)

diff --git a/net-dns/bind/bind-9.20.7-r2.ebuild 
b/net-dns/bind/bind-9.20.7-r2.ebuild
index a6cfece905b5..1d743ff40288 100644
--- a/net-dns/bind/bind-9.20.7-r2.ebuild
+++ b/net-dns/bind/bind-9.20.7-r2.ebuild
@@ -136,7 +136,7 @@ src_install() {
        fi
 
        insinto /etc/bind
-       newins "${FILESDIR}"/named.conf-r8 named.conf
+       newins "${FILESDIR}"/named.conf-r9 named.conf
        newins "${FILESDIR}"/named.conf.auth named.conf.auth
 
        newinitd "${FILESDIR}"/named.init-r15 named

diff --git a/net-dns/bind/files/named.conf-r9 b/net-dns/bind/files/named.conf-r9
new file mode 100644
index 000000000000..62b34bc6e9a3
--- /dev/null
+++ b/net-dns/bind/files/named.conf-r9
@@ -0,0 +1,165 @@
+/*
+ * Refer to the named.conf(5) and named(8) man pages, and the documentation
+ * in /usr/share/doc/bind-* for more details.
+ * Online versions of the documentation can be found here:
+ * https://kb.isc.org/article/AA-01031
+ *
+ * If you are going to set up an authoritative server, make sure you
+ * understand the hairy details of how DNS works. Even with simple mistakes,
+ * you can break connectivity for affected parties, or cause huge amounts of
+ * useless Internet traffic.
+ */
+
+acl "xfer" {
+       /* Deny transfers by default except for the listed hosts.
+        * If we have other name servers, place them here.
+        */
+       none;
+};
+
+/*
+ * You might put in here some ips which are allowed to use the cache or
+ * recursive queries
+ */
+acl "trusted" {
+       127.0.0.0/8;
+       ::1/128;
+};
+
+options {
+       directory "/var/bind";
+       pid-file "/run/named/named.pid";
+
+       /* https://www.isc.org/solutions/dlv >=bind-9.7.x only */
+       //bindkeys-file "/etc/bind/bind.keys";
+
+       listen-on-v6 { ::1; };
+       listen-on { 127.0.0.1; };
+
+       allow-query {
+               /*
+                * Accept queries from our "trusted" ACL.  We will
+                * allow anyone to query our master zones below.
+                * This prevents us from becoming a free DNS server
+                * to the masses.
+                */
+               trusted;
+       };
+
+       allow-query-cache {
+               /* Use the cache for the "trusted" ACL. */
+               trusted;
+       };
+
+       allow-recursion {
+               /* Only trusted addresses are allowed to use recursion. */
+               trusted;
+       };
+
+       allow-transfer {
+               /* Zone tranfers are denied by default. */
+               none;
+       };
+
+       allow-update {
+               /* Don't allow updates, e.g. via nsupdate. */
+               none;
+       };
+
+       /*
+       * If you've got a DNS server around at your upstream provider, enter its
+       * IP address here, and enable the line below. This will make you benefit
+       * from its cache, thus reduce overall DNS traffic in the Internet.
+       *
+       * Uncomment the following lines to turn on DNS forwarding, and change
+       *  and/or update the forwarding ip address(es):
+       */
+/*
+       forward first;
+       forwarders {
+       //      123.123.123.123;        // Your ISP NS
+       //      124.124.124.124;        // Your ISP NS
+       //      4.2.2.1;                // Level3 Public DNS
+       //      4.2.2.2;                // Level3 Public DNS
+               8.8.8.8;                // Google Open DNS
+               8.8.4.4;                // Google Open DNS
+       };
+
+*/
+
+       //dnssec-validation yes;
+
+       /*
+        * As of bind 9.8.0:
+        * "If the root key provided has expired,
+        * named will log the expiration and validation will not work."
+        */
+       dnssec-validation auto;
+
+       /* if you have problems and are behind a firewall: */
+       //query-source address * port 53;
+};
+
+/*
+logging {
+       channel default_log {
+               file "/var/log/named/named.log" versions 5 size 50M;
+               print-time yes;
+               print-severity yes;
+               print-category yes;
+       };
+
+       category default { default_log; };
+       category general { default_log; };
+};
+*/
+
+include "/etc/bind/rndc.key";
+controls {
+       inet 127.0.0.1 port 953 allow { 127.0.0.1/32; ::1/128; } keys { 
"rndc-key"; };
+};
+
+zone "." in {
+       type hint;
+       file "/var/bind/named.cache";
+};
+
+zone "localhost" IN {
+       type master;
+       file "pri/localhost.zone";
+       notify no;
+};
+
+/*
+ * Briefly, a zone which has been declared delegation-only will be effectively
+ * limited to containing NS RRs for subdomains, but no actual data beyond its
+ * own apex (for example, its SOA RR and apex NS RRset). This can be used to
+ * filter out "wildcard" or "synthesized" data from NAT boxes or from
+ * authoritative name servers whose undelegated (in-zone) data is of no
+ * interest.
+ * See http://www.isc.org/software/bind/delegation-only for more info
+ */
+
+//zone "COM" { type delegation-only; };
+//zone "NET" { type delegation-only; };
+
+//zone "YOUR-DOMAIN.TLD" {
+//     type master;
+//     file "/var/bind/pri/YOUR-DOMAIN.TLD.zone";
+//     allow-query { any; };
+//     allow-transfer { xfer; };
+//};
+
+//zone "YOUR-SLAVE.TLD" {
+//     type slave;
+//     file "/var/bind/sec/YOUR-SLAVE.TLD.zone";
+//     masters { <MASTER>; };
+
+       /* Anybody is allowed to query but transfer should be controlled by the 
master. */
+//     allow-query { any; };
+//     allow-transfer { none; };
+
+       /* The master should be the only one who notifies the slaves, shouldn't 
it? */
+//     allow-notify { <MASTER>; };
+//     notify no;
+//};

Reply via email to