DNS servers can be attacked using various techniques including:
- DNS spoofing
- Cache poisoning
- Registration hijacking
One of the simplest ways to defend is to strictly limit zone transfers between nameservers by defining an ACL. Many system administrators allows BIND to transfer zones in bulk outside of their network or organisation. This is an attack vector. You can prevent this by using ACLs: Read more…
named.conf
Create /etc/named.conf file specify the directory location of other files used by DNS: Read more…
A Record
The majority of DNS records are “A” records. A records allow for you to point different sections of your domain to different IP addresses or servers. For example, this would be useful for having “www.domain.com” point to your web server’s IP address and “mail.domain.com” point to your mail server’s IP address. Each record includes a “Host Name” value and a corresponding IP Address. Read more…
This is a link to a brief description of what happens in a Linux system, from the time that you turn on the power, to the time that you log in and get a bash prompt. Understanding this will be helpful when you need to solve problems or configure your system.
http://www.tldp.org/HOWTO/From-PowerUp-To-Bash-Prompt-HOWTO.html
Greg O’Keefe, gcokeefe@postoffice.utas.edu.au