Kategorie: Internet

mein DNS mit Bind9 auf Ubuntu

Configs

server.amhang9.de -MASTER-
/etc/bind/named.conf.options

acl goodclients {
        localhost;
        localnets;
};

options {
	directory "/var/cache/bind";

	// If there is a firewall between you and nameservers you want
	// to talk to, you may need to fix the firewall to allow multiple
	// ports to talk.  See http://www.kb.cert.org/vuls/id/800113

	// If your ISP provided one or more IP addresses for stable 
	// nameservers, you probably want to use them as forwarders.  
	// Uncomment the following block, and insert the addresses replacing 
	// the all-0's placeholder.

	// forwarders {
	// 0.0.0.0;
	// };

	//========================================================================
	// If BIND logs error messages about the root key being expired,
	// you will need to update your keys.  See https://www.isc.org/bind-keys
	//========================================================================
//	dnssec-validation auto;

	auth-nxdomain no;    # conform to RFC1035
//	listen-on-v6 { any; };
	listen-on { 37.120.163.133; 
		127.0.0.1;				
};
	request-ixfr no;	
//	allow-query { goodclients; };
};


zone "tzsz.de" {
	type master;
        file "/var/lib/bind/db.tzsz.de";
	allow-transfer { 5.45.98.66; };
	also-notify { 5.45.98.66; };
};

zone "muc.mes" IN {
	type forward;
	forwarders {
	192.168.15.1;
    };
};

zone "ah9.mes" IN {
        type forward;
        forwarders {
        192.168.234.1;
    };
};

serv.amhang9.de -SLAVE-
/etc/bind/named.conf.options

acl goodclients {
        localhost;
        localnets;
};

options {
	directory "/var/cache/bind";

	// If there is a firewall between you and nameservers you want
	// to talk to, you may need to fix the firewall to allow multiple
	// ports to talk.  See http://www.kb.cert.org/vuls/id/800113

	// If your ISP provided one or more IP addresses for stable 
	// nameservers, you probably want to use them as forwarders.  
	// Uncomment the following block, and insert the addresses replacing 
	// the all-0's placeholder.

	// forwarders {
	// 0.0.0.0;
	// };

	//========================================================================
	// If BIND logs error messages about the root key being expired,
	// you will need to update your keys.  See https://www.isc.org/bind-keys
	//========================================================================
//        dnssec-validation auto;

        auth-nxdomain no;    # conform to RFC1035
        listen-on-v6 { any; };
        listen-on { 5.45.98.66; 
		127.0.0.1;
};
	request-ixfr no;
//	allow-query { goodclients; };
};

zone "tzsz.de" {
        type slave;
        file "/var/cache/bind/db.tzsz.de";
	masters { 37.120.163.133; };
};


zone "muc.mes" IN {
        type forward;
        forwarders {
        192.168.15.1;
    };
};

zone "elip.mes" IN {
        type forward;
        forwarders {
        192.168.112.1;
    };
};

server.amhang9.de /var/lib/bind/db.tzsz.de

;
; BIND data file for local loopback interface
;
$TTL	3600
@	2560	IN	SOA	tzsz.de. root.tzsz.de. (
				     53		; Serial
				3600		; Refresh
				  3600		; Retry
				3600		; Expire
				 3600 )	; Negative Cache TTL
	3600	IN	A	37.120.163.133
@	3600	IN	MX	100 mxlb.ispgateway.de.
;
@	86400	IN	NS	server.amhang9.de.
@	86400	IN	NS	serv.amhang9.de.
@	3600	IN	A	37.120.163.133
@	3600	IN	AAAA	2a03:4000:6:3114::1
*	3600	IN	A	37.120.163.133
*	3600    IN      AAAA    2a03:4000:6:3114::1
foehn	3600	IN	AAAA	2001:4c50:14d:cb00:208:9bff:fed2:4777
ow	3600	IN	AAAA	2001:4c50:100:4:9c0a:bbbb:fbec:4416

Befehle

dig ANY amhang9.de @ns.namespace4you.de
dig ANY tzsz.de @server.amhang9.de

Dokus

http://www.zytrax.com/books/dns/
https://help.ubuntu.com/community/BIND9ServerHowto

SSL für QNAP NAS

(!) das ist es nicht mehr (!)

 

c&p von https://forum.qnapclub.de/thread/39039-howto-eigenes-zertifikat-mit-qnap-letsencrypt/

ACHTUNG:   souce PATH /etc/profile.d/python2.bash

[NAS Typ:] ARM / Intel
[Firmware:] 4.2.x
[Getestet:] ja – auf diversen Geräten
[Sonstige Modifikationen:] keine

In 5 Minuten zum eigenen Zertifikat mit „qnap-letsencrypt“ !!!
Eine TOP Alternative – getestet und funzt prima!!!

github.com/Yannik/qnap-letsencrypt
Weiterlesen

startcom ssl qnap

HOW TO INSTALL SSL/TLS ON QNAP

First look for a certificate provider who can provide a free SSL/TLS for Server certificate. I have searched and compiled a list of free certificates who can provide a free certificate for QNAP.

I will show you how to get the certificate and install these on the QNAP from startssl.com, with this you can get unlimited free renewals.

Please check the list below:

List of free SSL/TLS certificates:

  1. https://startssl.com/
  2. https://buy.wosign.com/free ( some time you get untrusted seller ).
  3. https://letsencrypt.org/ ( Auto install with Plesk ).
  4. https://www.digitalberg.com/ssl-certificates/ssl-price/ (from top provider).

SSL/TLS

I’m going to start a sign up on StartSSL where you can decrypt the private key tool inside of the My Account link.

I have a QNAP PRO TS-269L, Firmware: 4.2.1

See the screenshot of where to apply for the certificates in the QNAP:

So we need a ‘certificate’, ‘Private key’ with encrypted and decrypted – both and ‘intermediate key’.

New Certificate keys must be installed on the QNAP on the first box, Decrypted private key for the second box in QNAP and intermediate certificate on third / last box in the QNAP, see the picture above.

QNAP security accepts a decrypted key instead of an encrypted private key so we have to use decrypt private key tool from StartSSL account or google it.

Let’s Start with Certificate

  1. Go to StartSSL.com
  2. Click on Sign-up
  3. Choose your country and personal / cooperate email.
  4. verify your code.
  5. Validate your Domain.
  6. Go to your account and click on certificate Wizard
  7. Select Web Server SSL/TLS Certificate
  8. Add your subdomain name for server. e.g. i have add ‘cloud’ before my domain.
  9. Next step is to create a CSR key for your cloud domain.
  10. For QNAP use Generate by PKI system with your password.
  11. Submit request, immediately you will get your Private Key and intermediate Key to download.
  12. Next step is to decrypt your encrypted Key certificate to decrypt for QNAP.
  13. Go back to your startSSL account then click on ‘ToolBox’.
  14. Look for decrypt Tool.
  15. Enter the Private Key into Enter Private Key and Password box and passphrase then click decrypt.
  16. Once you get your decrypted key please save this as decrypt private key.
  17.  Now you should have intermediate key, decrypt key and Certificate ready in folder.

Now go to QNAP

  1. Login to your QNAP
  2. Go to Control panel > System settings > Security.
  3. Add your first ‘Certificate’ on first box
  4. Then Add your Decrypted Key on your QNAp second box. where mentioned: PrivateKey: please enter a certificate or private key in x.509PEM format below.
  5. last thing is to copy and paste this ‘intermediate key’ on the last / third box and then Apply. good to go!
  6. Go to your URL to check e.g. https://cloud.qureshi.me.