summary refs log blame commit diff
path: root/named.conf.local
blob: 1f0344a83694f3a055c3265cf158775c580f614d (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15














                                                                    
                             
































                                                                       









                                                                



















                                                                   









                                                                










































                                                                     
                                                          











































































                                                                       



















                                                                   
//
// Do any local configuration here
//

// Consider adding the 1918 zones here, if they are not used in your
// organization
// include "/etc/bind/zones.rfc1918";

acl internals {
	127.0.0.1;
	192.168.1.0/24;
};

include "/etc/bind/tilde_msT.key";
include "/etc/bind/certbot.key";
include "/etc/bind/club.key";

server 89.163.145.170 { keys { tilde_msT; }; };

zone "tildeverse.net" {
	type master;
	file "/etc/bind/zones/db.tildeverse.net";
	also-notify { 167.114.154.31; 89.163.145.170; };
	allow-transfer { 167.114.154.31; key tilde_msT;};
	update-policy {
		grant certbot name _acme-challenge.tildeverse.net. txt;
	};
};

zone "tildeverse.org" {
	type master;
	file "/etc/bind/zones/db.tildeverse.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tildeverse.org. txt;
	};
};

zone "fuckup.club" {
	type master;
	file "/etc/bind/zones/db.fuckup.club";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.fuckup.club. txt;
	};
};

zone "nand.sh" {
	type master;
	file "/etc/bind/zones/db.nand.sh";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.nand.sh. txt;
	};
};

zone "tild3.org" {
	type master;
	file "/etc/bind/zones/db.tild3.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tild3.org. txt;
	};
};

zone "tilde.chat" {
	type master;
	file "/etc/bind/zones/db.tilde.chat";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.chat. txt;
	};
};

zone "tilde.club" {
	type master;
	file "/etc/bind/zones/db.tilde.club";
	allow-transfer { 167.114.154.31; };
	also-notify { 167.114.154.31; };
	update-policy {
		grant club name _acme-challenge.tilde.club. txt;
	};
};

zone "tildegit.org" {
	type master;
	file "/etc/bind/zones/db.tildegit.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tildegit.org. txt;
	};
};

zone "tilde.life" {
	type master;
	file "/etc/bind/zones/db.tilde.life";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.life. txt;
	};
};

zone "tildenet.org" {
	type master;
	file "/etc/bind/zones/db.tildenet.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tildenet.org. txt;
	};
};

zone "tilde.news" {
	type master;
	file "/etc/bind/zones/db.tilde.news";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.news. txt;
	};
};

zone "tildenic.org" {
	type master;
	file "/etc/bind/zones/db.tildenic.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tildenic.org. txt;
	};
};

zone "tilde.ninja" {
	type master;
	file "/etc/bind/zones/db.tilde.ninja";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.ninja. txt;
	};
};

zone "tilde.pizza" {
	type master;
	file "/etc/bind/zones/db.tilde.pizza";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.pizza. txt;
	};
};

zone "tilderadio.org" {
	type master;
	file "/etc/bind/zones/db.tilderadio.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilderadio.org. txt;
	};
};

zone "tilde.site" {
	type master;
	file "/etc/bind/zones/db.tilde.site";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.site. txt;
	};
};

zone "tilde.team" {
	type master;
	file "/etc/bind/zones/db.tilde.team";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.team. txt;
	};
};

zone "tildeteam.org" {
	type master;
	file "/etc/bind/zones/db.tildeteam.org";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tildeteam.org. txt;
	};
};

zone "tilde.wiki" {
	type master;
	file "/etc/bind/zones/db.tilde.wiki";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.wiki. txt;
	};
};

zone "tilde.zone" {
	type master;
	file "/etc/bind/zones/db.tilde.zone";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.tilde.zone. txt;
	};
};

zone "ttm.sh" {
	type master;
	file "/etc/bind/zones/db.ttm.sh";
	allow-transfer { 167.114.154.31; key tilde_msT; };
	also-notify { 167.114.154.31; 89.163.145.170; };
	update-policy {
		grant certbot name _acme-challenge.ttm.sh. txt;
	};
};