BIND
BIND (or named) is the most widely used Domain Name System (DNS) server.
Installation
Start/enable the named.service
systemd unit.
To use the DNS server locally, use the 127.0.0.1
nameserver (meaning clients like Firefox resolve via 127.0.0.1), see Domain name resolution. This will however require you to #Allow recursion while a firewall might block outside queries to your local named.
Configuration
BIND is configured in /etc/named.conf
. The available options are documented in named.conf(5).
Reload the named.service
unit to apply configuration changes.
Enable rndc access
In order to control BIND using rndc(8), you need to set up TSIG key for it and tell BIND to allow name server control with that key.
First, generate TSIG key for this purpose:
$ tsig-keygen console key "console" { algorithm hmac-sha256; secret "secret"; };
Copy the output to both /etc/named.conf
and /etc/rndc.conf
.
In /etc/rndc.conf
, append default name server connection:
/etc/rndc.conf
... options { default-key "console"; default-server 127.0.0.1; default-port 953; };
Allow rndc
control from localhost in
/etc/named.conf
:
/etc/named.conf
... controls { inet 127.0.0.1 port 953 allow { 127.0.0.1; } keys { "console"; }; }; ...
Now you can use rndc
to control the local DNS server. For example, to check server status:
$ rndc status
Reloading server configuration can also be done by:
# rndc reload
Restrict access to localhost
BIND by default listens on port 53
of all interfaces and IP addresses. To only allow connections from localhost, add the following line to the options
section in /etc/named.conf
:
listen-on { 127.0.0.1; }; listen-on-v6 { ::1; }; allow-recursion { 127.0.0.1; ::1; };
Set up DNS forwarding
To make BIND forward DNS queries to another DNS server, add the forwarders
clause to the options
section.
For example, to make BIND forward to the Google Public DNS servers using DNS over TLS:
tls google { remote-hostname "dns.google"; }; options { ... forward only; forwarders port 853 tls google { 8.8.8.8; 2001:4860:4860::8888; 8.8.4.4; 2001:4860:4860::8844; }; };
Serve DNS over TLS or HTTPS
To enable serving DNS over TLS or HTTPS in BIND, define a tls block specifying your certificate, then add listen-on clauses enabling DNS over TLS and HTTPS listeners (as well as a standard DNS listener).
/etc/named.conf
tls mycert { cert-file "<path>.crt"; key-file "<path>.key"; }; options { // Standard port 53 listeners need to be re-added explicitly listen-on { any; }; listen-on-v6 { any; }; // Add a DNS over TLS listener on standard port 853 listen-on tls mycert { any; }; listen-on-v6 tls mycert { any; }; // Add a DNS over HTTPS listener on standard HTTPS port 443 listen-on tls mycert http default { any; }; listen-on-v6 tls mycert http default { any; }; // If needed, add a cleartext HTTP listener for a reverse proxy //listen-on port 8443 tls none http default { 127.0.0.1; }; //listen-on-v6 port 8443 tls none http default { ::1; }; }; ...
Note that tls{
} is defined at the top level, not inside the options{
} block.
A configuration template for running a domain
Following is a simple home nameserver being set up, using domain.tld as the domain being served world-wide like this wiki's archlinux.org domain is.
A more elaborate example is DNS server with BIND9, while this shows how to set up internal network name resolution.
Creating a zonefile
Create /var/named/domain.tld.zone
.
$ORIGIN domain.tld. $TTL 2h @ SOA ns1 hostmaster ( 2018111111 ; Serial 8h ; Refresh 30m ; Retry 1w ; Expire 1h ) ; Negative Cache TTL NS ns1 NS ns2 @ A 203.0.113.1 AAAA 2001:db8:113::1 MX 10 mail TXT "v=spf1 mx" www A 203.0.113.1 AAAA 2001:db8:113::1 ns1 A 203.0.113.4 AAAA 2001:db8:113::4 ns2 A 198.51.100.5 AAAA 2001:db8:5100::5 mail A 198.51.100.6 AAAA 2001:db8:5100::6 imap CNAME mail smtp CNAME mail
$ORIGIN
defines the default suffix for all names which do not already end with a .
(dot), e.g. mail
will be expanded to mail.$ORIGIN
⇒ mail.domain.tld.
everywhere.
$TTL
defines the default time-to-live (i.e. cache expiry time) for all records which do not have their own TTL specified. Here it is 2 hours.
Serial must be incremented manually before reloading named every time you change a resource record for the zone. Otherwise secondary servers (replicas or slaves) will not re-transfer the zone: they only do it if the serial is greater than that of the last time they transferred the zone. This example uses the somewhat common YYYYMMDDXX
format, but this is not required; the serial number can also just start at 1.
Configuring primary server
Add your zone to /etc/named.conf
:
zone "domain.tld" IN { type primary; file "domain.tld.zone"; allow-update { none; }; };
Reload the named.service
unit to apply the configuration change.
Configuring secondary server
In case you have two or more servers, you can set up all but one of them as secondary, where the zone is retrieved from primary via AXFR transfer.
On primary, explicitly allow zone transfers from secondary:
zone "domain.tld" IN { ... allow-transfer { 198.51.100.5; 20001:db8:113::4; }; };
On secondary, add the zone to /etc/named.conf
:
zone "domain.tld" IN { type secondary; file "domain.tld.zone"; primaries { 203.0.113.4; 2001:db8:113::4; }; };
Reload named.service
or use rndc(8) to reload both primary and secondary servers configuration.
Allow recursion
If you are running your own DNS server, you might as well use it for all DNS lookups, or even #Serve the root zone locally by yourself. The former will require the ability to do recursive lookups. In order to prevent DNS Amplification Attacks, recursion is turned off by default for most resolvers. The default Arch /etc/named.conf
file allows for recursion only on the loopback interface:
allow-recursion { 127.0.0.1; ::1; };
If you want to provide name service for your local network; e.g. 192.168.0.0/24, you must add the appropriate range of IP addresses to /etc/named.conf
:
allow-recursion { 192.168.0.0/24; fd01:2345:6789::/64; 127.0.0.1; ::1; };
Configuring BIND to serve DNSSEC signed zones
BIND makes it easy to serve DNSSEC-signed zones with Key and Signing Policy (KASP) facility, where it takes care of zone signing and key management automatically for you using user-defined policy.
Create separate directory to store keys, writable by the server:
# mkdir /var/named/keys # chown named:named /var/named/keys
Instruct BIND to store keys in aforementioned directory:
/etc/named.conf
options { ... key-directory "/var/named/keys"; ... };
Now zones can be signed by applying the desired policy. In most cases, you can apply up-to-date DNSSEC best practices with default
policy:
/etc/named.conf
zone "domain.tld" IN { ... dnssec-policy default; };
This will sign the zone with single ecdsap256sha256
combined signing key (CSK) with unlimited key lifetime, signed via inline-signing
where the server generates the signed zone separately without having to set-up dynamic DNS.
If needed, a custom policy can be defined with dnssec-policy
block. For example, the main
policy signs the zone with traditional key signing key (KSK, rotated yearly) and zone signing key (ZSK, rotated monthly) split, alongside with timing parameters and NSEC3 denial-of-existence:
/etc/named.conf
dnssec-policy main { keys { ksk lifetime P1Y algorithm ecdsap256sha256; zsk lifetime P1M algorithm ecdsap256sha256; }; publish-safety 1h; retire-safety 1h; purge-keys 1h; signatures-refresh P3D; signatures-validity P3W; signatures-validity-dnskey P3W; inline-signing yes; nsec3param iterations 0 optout no salt-length 0; }; ...
The custom policy can be applied in the same way as default policy earlier:
/etc/named.conf
zone "domain.tld" IN { ... dnssec-policy main; };
Increment the zone's serial and reload the server configuration.
The last step is to establish chain of trust with parent zone. First, check DNSSEC status of the zone:
$ rndc dnssec -status domain.tld dnssec-policy: main current time: Tue Mar 25 08:51:53 2025 key: 58785 (ECDSAP256SHA256), KSK published: yes - since Tue Mar 25 08:47:23 2025 key signing: yes - since Tue Mar 25 08:47:23 2025 Next rollover scheduled on Wed Mar 25 06:42:23 2026 - goal: omnipresent - dnskey: rumoured - ds: hidden - key rrsig: rumoured key: 5017 (ECDSAP256SHA256), ZSK published: yes - since Tue Mar 25 08:47:23 2025 zone signing: yes - since Tue Mar 25 08:47:23 2025 Next rollover scheduled on Fri Apr 25 06:42:23 2025 - goal: omnipresent - dnskey: rumoured - zone rrsig: rumoured
Here, the KSK key ID is 58785. Yours will be different.
Generate the DS record (replace key ID as appropriate):
$ dnssec-dsfromkey -2 /var/named/keys/Kdomain.tld.+013+58785 domain.tld. IN DS 58785 13 2 hash
Submit DS to the parent zone (for example, by filling the web form on your registrar).
When you've confirmed that the DS record has been published in the parent zone, you can signal BIND as such by:
$ rndc dnssec -checkds -key 58785 published domain.tld
Automatically listen on new interfaces
By default bind scan for new interfaces and stop listening on interfaces which no longer exist every hour. You can tune this value by adding :
interface-interval rescan-timeout-in-minutes;
parameter into named.conf
options section, the max value is 28 days (40320 min). You can disable this feature by setting its value to 0.
Then restart the service.
Running BIND in a chrooted environment
Running in a chroot environment is not required but improves security.
Creating the jail house
In order to do this, we first need to create a place to keep the jail, we shall use /srv/named
, and then put the required files into the jail.
# mkdir -p /srv/named/{dev,etc,usr/lib/engines,var/{run,log,named}}
Copy over required system files:
# cp -av /etc/{localtime,named.conf} /srv/named/etc/ # cp -av /usr/lib/engines-1.1/* /srv/named/usr/lib/engines/ # cp -av /var/named/* /srv/named/var/named/.
Set up required nodes in /dev/
:
# mknod /srv/named/dev/null c 1 3 # mknod /srv/named/dev/random c 1 8
Set ownership of the files:
# chown -R named:named /srv/named
This should create the required file system for the jail.
Service unit
Next we need a replacement unit file so that the service calls bind which will allow force bind into the chroot:
/etc/systemd/system/named-chroot.service
ExecStart=/usr/bin/named -4 -f -u named -t "/srv/named"
Now, reload systemd with daemon-reload, and start the named-chroot.service
.
Serve the root zone locally
If you do not want to rely on third-party DNS services, you can serve the root zone locally following RFC:7706. This can be achieved by using BIND as a DNS recursive resolver.
To manage a recursive resolver, you typically need to configure a root hints file. This file contains the names and IP addresses of the authoritative name servers for the root zone.
Grab the file from IANA website and place it into /var/named
.
Edit your server config, adding the respective file:
/etc/named.conf
zone "." IN { type hint; file "named.root"; };
Recursion also should be allowed in the config. See #Allow recursion.
See also
- BIND 9 Administrator Reference Manual (ARM)
- BIND ARM on readthedocs
- BIND knowledgebase
- Internet Systems Consortium, Inc. (ISC)
- Pro DNS and BIND with abbreviated version online
- DNS Glossary
- Archived mailing list discussion on BIND's future
-
root zone transfer made simple - serve root@home copy the
/etc/named.conf
, restart BIND & enjoy! - DNSSEC