Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
122 changes: 122 additions & 0 deletions docs/guides/dns/nsd_authoritative_dns.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,122 @@
---
title: NSD Authoritative DNS
author: Neel Chauhan
contributors:
tested_with: 9.4
tags:
- dns
---

An alternative to BIND, [NSD](https://www.nlnetlabs.nl/projects/nsd/about/) (Name Server Daemon) is a modern authoritative-only DNS server maintained by [NLnet Labs](https://www.nlnetlabs.nl/).

## Prerequisites and assumptions

- A server running Rocky Linux
- Able to use *firewalld* for creating firewall rules
- A domain name or internal recursive DNS server pointed to your authoritative DNS server

## Introduction

External, or public, DNS servers map hostnames to IP addresses and, in the case of PTR (known as "pointer" or "reverse") records, map the IP addresses to the hostname. This is an essential part of the Internet. It makes your mail server, web server, FTP server, or many other servers and services work as expected no matter where you are.

## Installing and enabling NSD

First install EPEL:

```bash
dnf install epel-release
```

Next install NSD:

```bash
dnf install nsd
```

## Configuring NSD

Before making changes to any configuration file, copy the original installed working file, `nsd.conf`:

```bash
cp /etc/nsd/nsd.conf /etc/nsd/nsd.conf.orig
```

That will help in the future if the introduction of errors into the configuration file occurs. It is *always* a good idea to make a backup copy before making changes.

Edit the *nsd.conf* file. The author uses *vi*, but you can substitute your favorite command line editor:

```bash
vi /etc/nsd/nsd.conf
```

Navigate to the bottom and insert the following:

```bash
zone:
name: example.com
zonefile: /etc/nsd/example.com.zone
```

Replace `example.com` with the domain name you are running a nameserver for.

Next, create the zone files:

```bash
vi /etc/nsd/example.com.zone
```

The DNS zone files are BIND compatible. In the file, insert:

```bash
$TTL 86400 ; How long should records last?
; $TTL used for all RRs without explicit TTL value
$ORIGIN example.com. ; Define our domain name
@ 1D IN SOA ns1.example.com. hostmaster.example.com. (
2024061301 ; serial
3h ; refresh duration
15 ; retry duration
1w ; expiry duration
3h ; nxdomain error ttl
)
IN NS ns1.example.com. ; in the domain
IN MX 10 mail.another.com. ; external mail provider
IN A 172.20.0.100 ; default A record
; server host definitions
ns1 IN A 172.20.0.100 ; name server definition
www IN A 172.20.0.101 ; web server definition
mail IN A 172.20.0.102 ; mail server definition
```

If you need help customizing BIND-style zone files, Oracle has [a good introduction to zone files](https://docs.oracle.com/en-us/iaas/Content/DNS/Reference/formattingzonefile.htm).

Save your changes.

## Enabling NSD

Next, allow DNS ports in `firewalld` and enable NSD:

```bash
firewall-cmd --add-service=dns --zone=public
firewall-cmd --runtime-to-permanent
systemctl enable --now nsd
```

Check DNS resolution with the `host` command:

```bash
% host example.com 172.20.0.100
Using domain server:
Name: 172.20.0.100
Address: 172.20.0.100#53
Aliases:

example.com has address 172.20.0.100
example.com mail is handled by 10 mail.another.com.
%
```

## Conclusion

While most people use third-party services for DNS, there are scenarios where self-hosting DNS is desired. For instance, telecom, hosting and social media companies host a large number of DNS entries where hosted services are undesirable.

NSD is one of many open source tools which make hosting DNS possible. Congratulations, you have your very own DNS server! Cheers!