How to set up a secondary DNS server in CentOS

This post was originally written for xmodulo.

In the previous tutorial, we created a primary DNS server (ns1) for a test domain example.tst. In this tutorial, we will create a secondary DNS server (ns2) for the same domain by using bind package on CentOS.
When it comes to setting up a secondary DNS server, the following factors should be kept in mind.
  • You do NOT need to manually create forward and reverse zone files in the secondary DNS server. The zone files will be periodically synced from the primary DNS server automatically.
  • Whenever any zone file is modified in the primary DNS server, the parameter 'serial' should be updated. The secondary DNS server will initiate synchronization (zone transfer) only if serial at the primary server has been changed.
We assume that the IP address of the secondary DNS server to be set up is 172.16.1.4. Let us start installing.

Setting up Hostnames

Just like the primary DNS server, the hostname of the secondary name server should be defined as FQDN properly.
# vim /etc/sysconfig/network
HOSTNAME=ns2.example.tst
Note that the hostname parameter specified in this file is used while the server is booting up. Therefore, the change does not take effect immediately. The following command can be used to change the hostname of a server immediately at run-time.
# hostname ns2.example.tst
Once set, hostname can be verified using the following command.
# hostname
ns2.example.tst
Before proceeding to the next step, make sure that the hostname of all three servers are set properly.

Installing Packages

Just like a primary server, a secondary DNS server can be set up with or without chroot. Necessary packages can be easily installed using yum.
Without chroot:
# yum install bind
With chroot:
# yum install bind-chroot

Preparing Configuration File for Zone Transfers

The DNS server powered by bind on CentOS will by default allow zone transfers for any requesting server. For security reasons, we need to configure the primary DNS server, such that it permits zone transfers to the secondary DNS server (172.16.1.4) only.

1. Primary DNS Server

Without chroot:
# vim /etc/named.conf
With chroot:
# vim /var/named/chroot/etc/named.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
zone "example.tst" IN {
    type master;
    file "example-fz"; ## the zone file hosted at NS1 ##
    allow-update { none; };
    allow-transfer {172.16.1.4; }; ## NS2 is permitted ##
};
 
zone "1.16.172.in-addr.arpa" IN {
    type master;
    file "rz-172-16-1"; ##the zone file hosted at NS1##
    allow-update { none; };
    allow-transfer {172.16.1.4; }; ## NS2 is permitted ##
};

2. Secondary DNS Server

The default configuration file provided with the installation could be used to configure the secondary server. However, we will be using another sample configuration file as it is easier to tune.
Without chroot:
# cp /usr/share/doc/bind-9.8.2/sample/etc/named.rfc1912.zones /etc/named.conf
With chroot:
# cp /usr/share/doc/bind-9.8.2/sample/etc/named.rfc1912.zones /var/named/chroot/etc/named.conf
After the sample configuration file is copied over, the following lines are added/modified.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
options {
        directory "/var/named";
        forwarders {8.8.8.8; };
 
};
 
zone "example.tst" IN {
        type slave;  ## NS2 role is defined ##
        file "example-fz"; ## the name of the zone file to be automatically created ##
        //allow-update { none; };
        allow-transfer {172.16.1.3; };  ## NS1 is allowed for zone transfer when necessary ##
        masters {172.16.1.3; }; ## the master NS1 is defined ##
};
 
zone "1.16.172.in-addr.arpa" IN {
        type slave; ## NS2 role is defined ##
        file "rz-172-16-1"; ## the name of the zone file to be automatically created ##
//      allow-update { none; };
        allow-transfer {172.16.1.3; };  ## the master NS1 is defined ##
        masters {172.16.1.3; };
};

Finalizing Installation

To make sure that there is no permission related issues, we need to adjust the following.
Without chroot:
chmod 770 /var/named/
With chroot, you need to modify the permission as follows AFTER named service has started.
# chmod 770 /var/named/chroot/var/named
Now that everything is ready, we can restart named service. Also, make sure that named service is added to startup list.
# service named restart
# chkconfig named on
If all goes well, the secondary DNS server should request a zone transfer from the primary DNS server, and populate its own /var/named. The log file /var/log/messages should contain useful information about the status of the named service as well as the zone transfer.

Testing a Secondary DNS Server

We can use dig or nslookup to test DNS operations. We will be demonstrating the use of nslookup in this tutorial. Necessary packages can be installed using yum.
# yum install bind-utils
# nslookup
> server 172.16.1.4
Default server:  172.16.1.4
Address:   172.16.1.4#53

> example.tst
Server:  172.16.1.4
Address: 172.16.1.4#53

Name: example.tst
Address:  172.16.1.3

> set type=mx
> example.tst
Server:  172.16.1.4
Address:  172.16.1.4#53

example.tst  mail exchanger = 10 mail.example.tst.

> exit

Troubleshooting

1. We do not need to create any zone files in the secondary DNS server. All the zone files will be synchronized from the primary server.
2. The named service at the secondary server will periodically initiate zone transfers with the primary server. If you want to force a one-time zone transfer, the command "rndc retransfer <FQDN>" can be used. For example:
# rndc retransfer example.tst
3. A secondary DNS server will update its zone files only if the serial at the primary server has been modified/incremented.
4. Make sure that the directory /var/named or /var/named/chroot/var/named (in case of chroot) is writable by named user.
5. /var/log/messages should contain useful information.
6. I have SELinux turned off.
7. Make sure UDP port 53 is allowed in the firewall.
Hope this helps.

Comments