summaryrefslogtreecommitdiffstats
path: root/source4/setup/provision.zone
blob: 2c8195b0b5910a812f9e37922d6cff14b7d40d1d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
; -*- zone -*-
; generated by provision.pl
$ORIGIN ${DNSDOMAIN}.
$TTL 1W
@               IN SOA  @   hostmaster (
                                ${DATESTRING}   ; serial
                                2D              ; refresh
                                4H              ; retry
                                6W              ; expiry
                                1W )            ; minimum
			IN NS	${HOSTNAME}
${HOSTIP6_BASE_LINE}
${HOSTIP_BASE_LINE}
;
${HOSTIP6_HOST_LINE}
${HOSTIP_HOST_LINE}
${GC_MSDCS_IP_LINE}
${GC_MSDCS_IP6_LINE}
${NTDSGUID}._msdcs	IN CNAME	${HOSTNAME}
;
; global catalog servers
_gc._tcp		IN SRV 0 100 3268	${HOSTNAME}
_gc._tcp.${DEFAULTSITE}._sites	IN SRV 0 100 3268	${HOSTNAME}
_ldap._tcp.gc._msdcs	IN SRV 0 100 3268	${HOSTNAME}
_ldap._tcp.${DEFAULTSITE}._sites.gc._msdcs	IN SRV 0 100 3268 ${HOSTNAME}
;
; ldap servers
_ldap._tcp		IN SRV 0 100 389	${HOSTNAME}
_ldap._tcp.dc._msdcs	IN SRV 0 100 389	${HOSTNAME}
_ldap._tcp.pdc._msdcs	IN SRV 0 100 389	${HOSTNAME}
_ldap._tcp.${DOMAINGUID}.domains._msdcs		IN SRV 0 100 389 ${HOSTNAME}
_ldap._tcp.${DEFAULTSITE}._sites		IN SRV 0 100 389 ${HOSTNAME}
_ldap._tcp.${DEFAULTSITE}._sites.dc._msdcs	IN SRV 0 100 389 ${HOSTNAME}
;
; krb5 servers
_kerberos._tcp		IN SRV 0 100 88		${HOSTNAME}
_kerberos._tcp.dc._msdcs	IN SRV 0 100 88	${HOSTNAME}
_kerberos._tcp.${DEFAULTSITE}._sites	IN SRV 0 100 88	${HOSTNAME}
_kerberos._tcp.${DEFAULTSITE}._sites.dc._msdcs	IN SRV 0 100 88 ${HOSTNAME}
_kerberos._udp		IN SRV 0 100 88		${HOSTNAME}
; MIT kpasswd likes to lookup this name on password change
_kerberos-master._tcp		IN SRV 0 100 88		${HOSTNAME}
_kerberos-master._udp		IN SRV 0 100 88		${HOSTNAME}
;
; kpasswd
_kpasswd._tcp		IN SRV 0 100 464	${HOSTNAME}
_kpasswd._udp		IN SRV 0 100 464 	${HOSTNAME}
;
; heimdal 'find realm for host' hack
_kerberos		IN TXT	${REALM}