[an error occurred while processing this directive]
HP OpenVMS Systems Documentation |
>
Compaq TCP/IP Services for OpenVMS
|
Previous | Contents |
Address match lists are used primarily to determine access control for server operations. They are also used to define priorities for querying other name servers and to set the addresses on which the BIND server listens for queries. The following example shows the syntax of the address match list:
address_match_list = address_match_list_element ; [ address_match_list_element; ... ] address_match_list_element = [ ! ] (ip_address [/length] | key key_id | acl_name | { address_match_list } ) |
The elements that constitute an address match list can be any of the following:
Elements can be negated with a leading exclamation mark (!). The match list names any , none , localhost , and localnets are predefined. More information on those names can be found in the description of the acl statement (see Section C.5.3.1).
When a given IP address or prefix is compared to an address match list, the list is traversed in order until an element matches. The interpretation of a match depends on whether the list is being used for access control, defining listen-on ports, or as a topology, and whether the element was negated. Specifically:
Because of the first-match aspect of the algorithm, an element that
defines a subset of another element in the list should come before the
broader element, regardless of whether either is negated. For example,
in
1.2.3/24; ! 1.2.3.13;
, the 1.2.3.13 element is ignored, because the algorithm will match any
lookup for 1.2.3.13 to the
1.2.3/24
element. Using
! 1.2.3.13; 1.2.3/24
corrects that problem by having 1.2.3.13 blocked by the negation, while
all other 1.2.3.* hosts fall through.
C.5.3 Configuration File Format
A BIND configuration file consists of statements and comments. Statements end with a semicolon. Many statements contain a block of substatements that also end with a semicolon. Table C-3 describes the configuration statements.
Statement | Description |
---|---|
acl | Specifies a named IP address matching list, for access control and other uses. |
controls | Declares control channels to be used by the rndc utility. |
include | Includes a file. |
key | Specifies key information for use in authentication and authorization using TSIG. See Section C.2.3 for more information. |
logging | Specifies what the server logs, and where the log messages are sent. |
options | Controls global server configuration options and sets defaults for other statements. |
server | Sets configuration options, and sets defaults for other statements. |
trusted-keys | Specifies trusted DNSSEC keys. |
view | Specifies a view. |
zone | Specifies a zone. |
The following sample is a configuration file for a master server:
options { directory "SYS$SPECIFIC:[TCPIP$BIND]"; }; zone "FRED.PARROT.BIRD.COM" in { type master; file "FRED_PARROT_BIRD_COM.DB"; }; zone "0.0.127.IN-ADDR.ARPA" in { type master; file "127_0_0.DB"; }; zone "LOCALHOST" in { type master; file "LOCALHOST.DB"; }; zone "208.20.16.IN-ADDR.ARPA" in { type master; file "208_20_16_IN-ADDR_ARPA.DB"; }; zone "." in { type hint; file "ROOT.HINT"; }; |
The following comment styles are valid in a BIND configuration file. Comments can appear anywhere in the file.
Do not use a semicolon (;) as a comment character in your configuration file. The semicolon indicates the end of a configuration statement; whatever follows is interpreted as the start of the next statement. |
The acl statement assigns a symbolic name to an address match list. It gets its name from a primary use of address match lists: access control lists (ACLs).
The access control lists used by the BIND service and OpenVMS ACLs are different structures with different purposes. |
The acl statement is formatted as follows:
acl acl-name { address_match_list }; |
Note that the address match list must be defined with acl before it can be used elsewhere; forward references are not allowed.
The following ACLs are created automatically:
ACL | Matches |
---|---|
any | All hosts |
none | No hosts |
localhost | The IPv4 addresses of all interfaces on the system |
localnets | Any host on an IPv4 network for which the system has an interface |
The ACLs
localhost
and
localnets
do not support IPv6. The ACL
localhost