DNSSEC テスト用ゾーンを準備 ( 下記 )
下記の環境を使用する。
http://lost-and-found-narihiro.blogspot.com/2010/06/dns-how-to-deploy-internal-root-zone-jp.html
# named -v
BIND 9.7.1
internal root : hat1-vm 192.168.1.50
internal jp : hat2-vm 192.168.1.51
internal test.co.jp : hat3-vm 192.168.1.52
cashing name server : hat4-vm 192.168.1.80
まずは、Island of chain trust を作成する前に各ゾーンを DNSSEC に対応させる。
[ internal root : hat1-vm ]
[root@hat1-vm named]# cat root_zone_internal.db
$TTL 86400
@ IN SOA x.root-servers.net. hostmaster.root-servers.net. (
2010062304
1h
15m
30d
1h )
IN NS x.root-servers.net.
x.root-servers.net. IN A 192.168.1.50
jp. IN NS x.dns.jp.
x.dns.jp. IN A 192.168.1.51
- generate KSK
[root@hat1-vm named]# pwd
/var/named <- ゾーンファイルがあるディレクトリ
[root@hat1-vm named]# dnssec-keygen -a RSASHA256 -3 -b 1024 -f ksk -r /dev/urandom .
Generating key pair..++++++ ...........................................................................++++++
K.+008+24796
-3
Use an NSEC3-capable algorithm to generate a DNSSEC key. If this
option is used and no algorithm is explicitly set on the command
line, NSEC3RSASHA1 will be used by default. Note that RSASHA256 and
RSASHA512 algorithms are NSEC3-capable.
-a algorithm
- generate ZSK
[root@hat1-vm named]# dnssec-keygen -a RSASHA256 -3 -b 2048 -r /dev/urandom .Generating key pair................................+++ ................................+++
K.+008+18525
- modify zone file
ゾーンファイルに KSK , ZSK と登録
[root@hat1-vm named]# cat K.+008+*.key > root.key
[root@hat1-vm named]# cat root_zone_internal.db
$TTL 86400
@ IN SOA x.root-servers.net. hostmaster.root-servers.net. (
2010062304
1h
15m
30d
1h )
IN NS x.root-servers.net.
x.root-servers.net. IN A 192.168.1.50
jp. IN NS x.dns.jp.
x.dns.jp. IN A 192.168.1.51
$INCLUDE "root.key";
- ゾーンに書名
[root@hat1-vm named]# dnssec-signzone -o . root_zone_internal.db
Verifying the zone using the following algorithms: RSASHA256.
Zone signing complete:
Algorithm: RSASHA256: KSKs: 1 active, 0 stand-by, 0 revoked
ZSKs: 1 active, 0 stand-by, 0 revoked
root_zone_internal.db.signed
- modify named.conf
options {
directory "/var/named";
pid-file "/var/run/named/named.pid";
max-cache-size 20M;
recursion no;
version "";
dnssec-enable yes; <- これ
dnssec-validation yes; <- これ
};
zone "." in {
type master;
# file "root_zone_internal.db";
file "root_zone_internal.db.signed"; <-これ
};
- BIND起動
[root@hat1-vm named]# named
シスログ
Jun 30 00:43:23 hat1-vm named[2243]: zone ./IN: loaded serial 2010062304 (DNSSEC signed)
チェック。大丈夫そう。
[root@hat1-vm named]# dig @127.1 . soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 . soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 40509
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 3
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;. IN SOA
;; ANSWER SECTION:
. 86400 IN SOA x.root-servers.net. hostmaster.root-servers.net. 2010062304 3600 900 2592000 3600
. 86400 IN RRSIG SOA 8 0 86400 20100729144058 20100629144058 18525 . v7wamV28v9gv36qAFy+FO6O90/aAU7gVmouFIqZobmZEZkpBSRpKqRoE sJS8DwtylTswMUStdNoQQksh7Am0T+s/C/NzAdw5Q7P4EgEZl0994KJD ecuDWacw8sh4ZA2WTS45X3vpiQdLrhRHuVp0oow5zazUCvs7d3d0PkIn LRGTDSXPvTwrWAVAwfqZc7sOitXxV0w4ZQpoQLNbMDO4c1QFNGbtoWOf lBjX2PBuAcA3vSDQ5045INszrOCBkPcgO5n9yAUddagSDxS41+4827K8 qAy4SaAwuCEkeXCMeRUXl6suh9KFmLtsH4sEnjrHkN8W/trmaRZNKG9O 1NEFhg==
[root@hat1-vm named]# dig @127.1 jp soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 jp soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2949
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 2
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;jp. IN SOA
;; AUTHORITY SECTION:
jp. 86400 IN NS x.dns.jp.
jp. 3600 IN NSEC x.root-servers.net. NS RRSIG NSEC
jp. 3600 IN RRSIG NSEC 8 1 3600 20100729144058 20100629144058 18525 . d1+KRH3zHRUbHjWa89PteodxieWybwJ1JHu8FVTVuQrS2q47qyZPyhzu BmA8XR9HW2B3a7ZML8IxMNB2pjPgnDguwoO+Kr0W0A72RueLkGFbw0Xd A2j2qcMdEvit7O2DMMe1Kx8ILclxZ+xtZrv4AyPU4Pt72u6Kqko3rvTX wQMsxzv5D7A7bLLJ5V6CgOT7fmRZFHwpKbEX2akScSEK77XXbOp+Paop dVlmmGwVpTeidtHQQy9AB7N27/AXiWBWmy63+1kUsclQOlIbs4i5NtO1 VeDjSW3TDW81ZO6kRkXWi6kQq0kDfeScH9ztswx74JNn5dQpmeMf+IKQ YKP4XQ==
;; ADDITIONAL SECTION:
x.dns.jp. 86400 IN A 192.168.1.51
;; Query time: 3 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Wed Jun 30 00:45:53 2010
;; MSG SIZE rcvd: 394
[root@hat1-vm named]#
[root@hat1-vm named]# dig @127.1 co.jp soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 co.jp soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1151
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 2
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;co.jp. IN SOA
;; AUTHORITY SECTION:
jp. 86400 IN NS x.dns.jp.
jp. 3600 IN NSEC x.root-servers.net. NS RRSIG NSEC
jp. 3600 IN RRSIG NSEC 8 1 3600 20100729144058 20100629144058 18525 . d1+KRH3zHRUbHjWa89PteodxieWybwJ1JHu8FVTVuQrS2q47qyZPyhzu BmA8XR9HW2B3a7ZML8IxMNB2pjPgnDguwoO+Kr0W0A72RueLkGFbw0Xd A2j2qcMdEvit7O2DMMe1Kx8ILclxZ+xtZrv4AyPU4Pt72u6Kqko3rvTX wQMsxzv5D7A7bLLJ5V6CgOT7fmRZFHwpKbEX2akScSEK77XXbOp+Paop dVlmmGwVpTeidtHQQy9AB7N27/AXiWBWmy63+1kUsclQOlIbs4i5NtO1 VeDjSW3TDW81ZO6kRkXWi6kQq0kDfeScH9ztswx74JNn5dQpmeMf+IKQ YKP4XQ==
;; ADDITIONAL SECTION:
x.dns.jp. 86400 IN A 192.168.1.51
;; Query time: 2 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Wed Jun 30 00:45:59 2010
;; MSG SIZE rcvd: 397
[root@hat1-vm named]#
キャッシュサーバから確認。
trusted-keys に internal root の KSK ( K.+008+24796 ) を登録
1 options {
2 directory "/var/named";
3 pid-file "/var/run/named/named.pid";
4 max-cache-size 5M;
5 recursion yes;
6 version "";
7 dnssec-enable yes;
8 dnssec-validation yes;
21 zone "." in {
22 type hint;
23 file "named.ca";
24 };
51 trusted-keys {
52
53 "." 257 3 8 "AwEAAbMQ3cEdLfYbAitpiWvfJkWKncHe2PyNwd77jHCwy0eSm7EBtqqo rZ 53 ic53HgeolqwoAxut/m+BmGCTHU8pcbrphiGIxrSz1o4KjzCcchKmvz vClM78IrB9XZA8Z1t 53 wTMf/n2i1aMxSbIrmaP9Ik4eu7xr2RwNu2y6LaJ fFGSF/7Z";
54
55 };
hints は内部ルートを指定している。
[root@hat4-vm hattori]# cat /var/named/named.ca
. 3600000 IN NS X.ROOT-SERVERS.NET.
X.ROOT-SERVERS.NET. 3600000 A 192.168.1.50
いざ、dig 。ad ビットが立ってるので大丈夫そう。
[root@hat4-vm ~]# dig @127.1 . soa +dnssec +multiline
; <<>> DiG 9.7.1 <<>> @127.1 . soa +dnssec +multiline
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15386
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;. IN SOA
;; ANSWER SECTION:
. 86400 IN SOA x.root-servers.net. hostmaster.root-servers.net. (
2010062304 ; serial
3600 ; refresh (1 hour)
900 ; retry (15 minutes)
2592000 ; expire (4 weeks 2 days)
3600 ; minimum (1 hour)
)
. 86400 IN RRSIG SOA 8 0 86400 20100729144058 (
20100629144058 18525 .
v7wamV28v9gv36qAFy+FO6O90/aAU7gVmouFIqZobmZE
ZkpBSRpKqRoEsJS8DwtylTswMUStdNoQQksh7Am0T+s/
[root@hat4-vm ~]# dig @127.1 . ns +dnssec +multiline
; <<>> DiG 9.7.1 <<>> @127.1 . ns +dnssec +multiline
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 45504
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;. IN NS
;; ANSWER SECTION:
. 86250 IN NS x.root-servers.net.
. 86250 IN RRSIG NS 8 0 86400 20100729144058 (
20100629144058 18525 .
tME2znW74GdLmDOuspJCcrWrAEu45nfEV9iP+k5HidCG
R19q12e3CMjvsWrKJB4M4238rhNipJc9YA+rWMw7bwwD
BgzwTJDI1HAt30eMiEJnAnBqDYoievjDDpSl32TkyuUQ
[ internal jp zone : hat2-vm ]
zone "jp" in {
type master;
file "jp_zone_internal.db";
};
[root@hat2-vm named]# cat jp_zone_internal.db
$TTL 86400
@ IN SOA x.dns.jp. hostmaster.dns.jp. (
2010062303
1h
15m
30d
1h )
IN NS x.dns.jp.
x.dns.jp. IN A 192.168.1.51
test.co.jp. IN NS ns.test.co.jp.
ns.test.co.jp. IN A 192.168.1.52
- generate KSK
[root@hat2-vm named]# pwd
/var/named
# dnssec-keygen -a RSASHA256 -3 -b 1024 -f ksk -r /dev/urandom jp
- generate ZKK
# dnssec-keygen -a RSASHA256 -3 -b 2048 -r /dev/urandom jp
- modify jp zone file
[root@hat2-vm named]# cat Kjp.+008+*.key > jp.key
[root@hat2-vm named]# cat jp_zone_internal.db
$TTL 86400
@ IN SOA x.dns.jp. hostmaster.dns.jp. (
2010062303
1h
15m
30d
1h )
IN NS x.dns.jp.
x.dns.jp. IN A 192.168.1.51
test.co.jp. IN NS ns.test.co.jp.
ns.test.co.jp. IN A 192.168.1.52
$INCLUDE "jp.key";
- sign jp zone
[root@hat2-vm named]# dnssec-signzone -o jp jp_zone_internal.db
Verifying the zone using the following algorithms: RSASHA256.
Zone signing complete:
Algorithm: RSASHA256: KSKs: 1 active, 0 stand-by, 0 revoked
ZSKs: 1 active, 0 stand-by, 0 revoked
jp_zone_internal.db.signed
[root@hat2-vm named]# named
Jun 30 01:25:19 hat2-vm named[2326]: zone jp/IN: loaded serial 2010062303 (DNSSEC signed)
[root@hat2-vm named]# dig @127.1 jp soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 jp soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17885
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 3
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;jp. IN SOA
;; ANSWER SECTION:
jp. 86400 IN SOA x.dns.jp. hostmaster.dns.jp. 2010062303 3600 900 2592000 3600
jp. 86400 IN RRSIG SOA 8 1 86400 20100729152408 20100629152408 20163 jp. WNS9s/JLh+QZcj73AkntNcu3fR7UfXgOZGq3aU7S55AjPOA5kCX71hMa OnRv2oFnojozxtTC6nOEWVXBifJ7pmbAApMg4W8RCwQAi2lVO43M+liF U1iJ4FuWT7BNVG63O4oUlQxhBWkgmV2h3eIL3m2b1LsGhWb09d9CH7hj Se6AmpmSRR69A8lAmUG/3godGnkqyPUPIZ6izLo9Q9PjCo4FLpiM7taT I+imqPkj54UEAEgNqP0pgNAnWjToZtpLhD2tsxuwW9yqyHaAv8/fgo9o 8xNNqz3m5bdxlc4KPdhBxDPl1hw6Xbxx0YOw+4Wp+A4RrbAaRpefYjzi RxHD1w==
;; AUTHORITY SECTION:
jp. 86400 IN NS x.dns.jp.
jp. 86400 IN RRSIG NS 8 1 86400 20100729152408 20100629152408 20163 jp. o0KawU5TH51OJq9/uyApCjydNUMuEmLzFOL4yDzDaw+TfHzBfkebRgdQ OFosbykoRBOVYZIy+7x0/B8vYRPvHm5K9tRFFIoxbEmV7RdTsY1NJqvI CB2fjhMJFzO1MS9H87Ws4y/q6aXu4h0+jitILTPV7U2W66YxRqQCHp25 xg6vCz/JI6snXlqAehswnNIRx3yHsIxxdBxReJRxhzJvjdIpLfPRPPcv ILw84+C5xzQCmKTw8CyK4ceS0kVWmriVSjgyKH2fTMJZ6LSNgguvc88q Bf5sGuoEPpJ/9BXV2o7Hj9BdpPXhinvbHc/Wttu6+UUIFfC36Ql9FpqV SOfXPA==
;; ADDITIONAL SECTION:
x.dns.jp. 86400 IN A 192.168.1.51
x.dns.jp. 86400 IN RRSIG A 8 3 86400 20100729152408 20100629152408 20163 jp. ZRtCXGXRiog8qvAn8OWjt+Ougu5GX7cHeE7TFHGTjGzGc3hVe4uCTFd8 OFKwFdb1Jp0DGZPXw2drjPGKFT/Al/uGHV53f3aacFxXIbd/AL0OGEat nMwYZS6D2a6VMezxZy3TTSc6XO9ZD+7niTtmMdvLAVtjHoO9Q9T6k7AW DVyDMazMF0woaYy8eRxjlCI5eMdp1Wdg+kfoKgAF/Nuv01yx7Ii8p3L7 wwv/odrC9F/lKSvNc17YoGzSsCAtd0TR0gpLNbZwdXXBFLq90hgoICpL kIcQdn2nB9Xu3jzO+N9Dy7TzvGunpMC1jt4nTCe0W5Wcl02laPWdejU4 uFik4g==
;; Query time: 3 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Wed Jun 30 01:25:57 2010
;; MSG SIZE rcvd: 984
[root@hat2-vm named]#
[root@hat2-vm named]# dig @127.1 co.jp soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 co.jp soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32409
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;co.jp. IN SOA
;; AUTHORITY SECTION:
jp. 3600 IN SOA x.dns.jp. hostmaster.dns.jp. 2010062303 3600 900 2592000 3600
jp. 3600 IN RRSIG SOA 8 1 86400 20100729152408 20100629152408 20163 jp. WNS9s/JLh+QZcj73AkntNcu3fR7UfXgOZGq3aU7S55AjPOA5kCX71hMa OnRv2oFnojozxtTC6nOEWVXBifJ7pmbAApMg4W8RCwQAi2lVO43M+liF U1iJ4FuWT7BNVG63O4oUlQxhBWkgmV2h3eIL3m2b1LsGhWb09d9CH7hj Se6AmpmSRR69A8lAmUG/3godGnkqyPUPIZ6izLo9Q9PjCo4FLpiM7taT I+imqPkj54UEAEgNqP0pgNAnWjToZtpLhD2tsxuwW9yqyHaAv8/fgo9o 8xNNqz3m5bdxlc4KPdhBxDPl1hw6Xbxx0YOw+4Wp+A4RrbAaRpefYjzi RxHD1w==
jp. 3600 IN NSEC test.co.jp. NS SOA RRSIG NSEC DNSKEY
jp. 3600 IN RRSIG NSEC 8 1 3600 20100729152408 20100629152408 20163 jp. JIQHWC+6W7+geaCUTKC1+DCSZqMKwikcoPZcXCYhOixqNpB9sT6p3R8A fdKf19mMXDyUIUbqN6zDNA1OP7x5gwJ4eFr8Kv+QA5Cafp3NaKkrcoGf iZA0lN+A1nIOVxvtbP9tj8pyOI0Vb+nMuQhbvac9IOVE8hxHzihh+04D tQRSJ/lHlgNyQK1THbwaQDfstw4DzxWyeCOrBHj7Q/4ofpL5XwvjnwfI cMfrj4CBHIHID/64pq6CulfvJwjaCFBU4Jalx99FwxeZ0DD+UY7zVGS5 F/nus3QkDqhO382YFiJp6UHsb/T5uOREq9v0kWe/UDEYg7NZLD0P7KHU 8q4+bw==
Island of chain trust になってないので、キャッシュサーバからの設定はまだ。
[ test.co.jp : hat3-vm ]
[root@hat3-vm named]# cat test.co.jp.db
$TTL 86400
@ IN SOA ns.test.co.jp. hostmaster.test.co.jp. (
2010062303
1h
15m
30d
1h )
IN NS ns.test.co.jp.
ns.test.co.jp. IN A 192.168.1.52
www.test.co.jp. IN A 10.0.0.1
133 dnssec-keygen -a RSASHA256 -3 -b 1024 -f ksk -r /dev/urandom test.co.jp
134 dnssec-keygen -a RSASHA256 -3 -b 2048 -r /dev/urandom test.co.jp
[root@hat3-vm named]# cat Ktest.co.jp.+008+*.key > test.co.jp.key
[root@hat3-vm named]# cat test.co.jp.db
$TTL 86400
@ IN SOA ns.test.co.jp. hostmaster.test.co.jp. (
2010062303
1h
15m
30d
1h )
IN NS ns.test.co.jp.
ns.test.co.jp. IN A 192.168.1.52
www.test.co.jp. IN A 10.0.0.1
$INCLUDE "test.co.jp.key";
[root@hat3-vm named]# dnssec-signzone -o test.co.jp test.co.jp.db
Verifying the zone using the following algorithms: RSASHA256.
Zone signing complete:
Algorithm: RSASHA256: KSKs: 1 active, 0 stand-by, 0 revoked
ZSKs: 1 active, 0 stand-by, 0 revoked
test.co.jp.db.signed
zone "test.co.jp" {
type master;
# file "test.co.jp.db";
file "test.co.jp.db.signed";
};
Jun 30 01:37:35 hat3-vm named[2764]: zone test.co.jp/IN: loaded serial 2010062303 (DNSSEC signed)
[root@hat3-vm named]# dig @127.1 test.co.jp soa +dnssec
; <<>> DiG 9.7.1 <<>> @127.1 test.co.jp soa +dnssec
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 48852
;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 3
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;test.co.jp. IN SOA
;; ANSWER SECTION:
test.co.jp. 86400 IN SOA ns.test.co.jp. hostmaster.test.co.jp. 2010062303 3600 900 2592000 3600
test.co.jp. 86400 IN RRSIG SOA 8 3 86400 20100729153623 20100629153623 8448 test.co.jp. TMtWJBFkKfWnBYyu/I1YddPXisB0HHN3YMJGtFvyPzqRzCpByoXGm5dp Hp30+XosNWdAQaNharVcdILUHJPdBAePzhT8HLiNQfTFVTyrLNikRVvp gmDtey8ueI5Kx+78oTwHHWAzcjUgT+9r9R0w4hP8ggjd0VR4KZb1k0rR wpkAuTKcFroJfQTS/7Kk6tYhvJ5DOfkutcQYK5ymhmiQoRKQl0zgDb// 5Lg8DwimbVofIhwDgSJYxKE2qSxN+pu1RFzPWB5snAJ5IOQMDwnAeU3h k0svEta6uzfI8cRPAgKATx47JmGcMCbQ25J2HhrlW52Dc4SaYIKVuO+/ wwCnlA==
;; AUTHORITY SECTION:
test.co.jp. 86400 IN NS ns.test.co.jp.
test.co.jp. 86400 IN RRSIG NS 8 3 86400 20100729153623 20100629153623 8448 test.co.jp. wAVapgwcoYN/BRZODCUC/JeFp/Nfg2r4cVP5vZGQZzalQRmSomVO6Iwv VLlZkajq2XLbS1v5LHIeu/wAWBaA0ms2MQ4eXSUZNmVIMXj3pyYgVTA2 WSENhzKZ2MsNoOJn3D2ypXxrRLB8SF2zLKHI9N4yRNtT6MDUD8PNT46c f2mEQMfotZdmd5tS2A/J13+nB2gCFN8MBxPWvJLnKoDYZUfc3y3the4b 3KpyJMswO4kvy4VqR9rHVYntIr4D5QFcIqxt+GtBjgAgx/W3C8TE+2ca akdiwhnwNuBKCSnAfH+njuc9+J0ReHa+CJO+XIhVCHRF8QBNImxR7odc uRD7VA==
;; ADDITIONAL SECTION:
ns.test.co.jp. 86400 IN A 192.168.1.52
ns.test.co.jp. 86400 IN RRSIG A 8 4 86400 20100729153623 20100629153623 8448 test.co.jp. bZgXs0iHMhS8VCbKSYMtYSvbM1qWd2bym4HeMsM2BihmYaFkm9M1BmTy pQEv9Jpb3MuZmW7iA6GWyX2u0xepbRI3CKmZMlzGX6MhuK8a1GgprH+R 2nlx0sLlkP6VT0dmOh1F1ANu6M4RE1zo2lHR++X9vacpqZzpJPhAegNr Aq09u35RnUcUSLo7miQGuO11/CESK76w1GXLXEDjxzkaqEIxIwVCwA9t E4mx7WG3U9zOqMlRgo9vJ5o06EcANhVDASGNCrw9I6AUPr9AYFn/lH/s wIE0eDZPqDkklxATNBCaGqOKL5j5eXEY4sjFSzHn82A0j/2JQkK2EZ/s EqeCrw==
とりあえずここまで。
Cheers!
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.