CLI tool for manipulating DNS of CloudFlare hosted domains. This tool uses CloudFlare's v4 API to add, remove, list, or modify DNS records.
Before the advent of a distributed domain name system; networked computers used local files to map hostnames to IP addresses. On Unix systems this file was named /etc/hosts or “the hosts file”. In those days, networks were small and managing a file with a handful of hosts was easy. However as the networks grew so did the methods of mapping hostnames and IP addresses.
In modern days with the internet totaling at somewhere around 246 million domain names (as of 2012) the hosts file has been replaced with a more scalable distributed DNS service.
For today's article I am going to explain how to create a basic firewall allow and deny filter list using the iptables package. We will be focused on creating a filtering rule-set for a basic everyday Linux web server running Web, FTP, SSH, MySQL, and DNS services.
Before we begin lets get an understanding of iptables and firewall filtering in general.
What is iptables? iptables is a package and kernel module for Linux that uses the netfilter hooks within the Linux kernel to provide filtering, network address translation, and packet mangling.
Bind is the most widely used DNS service software out there, it is the default DNS service for all of the main distributions of Unix/Linux.
While Bind is very popular it is also very tricky sometimes. One of the best ways to see if your edits are good and meet the DNS standards is to run a named-checkzone after editing a zone file and before reloading/restarting bind.
slize:~# named-checkzone bencane.com /etc/bind/master/bencane.