Sindbad~EG File Manager

Current Path : /etc/
Upload File :
Current File : //etc/named.conf

include "/etc/rndc.key";

controls {
	inet 127.0.0.1 allow { localhost; } keys { "rndc-key"; };
};

options {
    /* make named use port 53 for the source of all queries, to allow
         * firewalls to block all ports except 53:
         */

    // query-source    port 53;
    
    recursion no;

    /* We no longer enable this by default as the dns posion exploit
        has forced many providers to open up their firewalls a bit */

    // Put files that named is allowed to write in the data/ directory:
    directory                "/var/named"; // the default
    pid-file                 "/var/run/named/named.pid";
    dump-file                "data/cache_dump.db";
    statistics-file          "data/named_stats.txt";
   /* memstatistics-file     "data/named_mem_stats.txt"; */
    allow-transfer    { "none"; };
};

logging {
        channel default_log {
                file "/var/log/named/named.log" versions 5 size 128M;
                print-time yes;
                print-severity yes;
                print-category yes;
                severity warning;
        };
        category default { default_log; };
        category general { default_log; };
};

// All BIND 9 zones are in a "view", which allow different zones to be served
// to different types of client addresses, and for options to be set for groups
// of zones.
//
// By default, if named.conf contains no "view" clauses, all zones are in the
// "default" view, which matches all clients.
//
// If named.conf contains any "view" clause, then all zones MUST be in a view;
// so it is recommended to start off using views to avoid having to restructure
// your configuration files in the future.

view "localhost_resolver" {
/* This view sets up named to be a localhost resolver ( caching only nameserver ).
 * If all you want is a caching-only nameserver, then you need only define this view:
 */
    match-clients         { 127.0.0.0/24; };
    match-destinations    { localhost; };
    recursion yes;

    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    /* these are zones that contain definitions for all the localhost
     * names and addresses, as recommended in RFC1912 - these names should
     * ONLY be served to localhost clients:
     */
    include "/var/named/named.rfc1912.zones";
};

view "internal" {
/* This view will contain zones you want to serve only to "internal" clients
   that connect via your directly attached LAN interfaces - "localnets" .
 */
    match-clients        { localnets; };
    match-destinations    { localnets; };
    recursion yes;

    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    // include "/var/named/named.rfc1912.zones";
    // you should not serve your rfc1912 names to non-localhost clients.

    // These are your "authoritative" internal zones, and would probably
    // also be included in the "localhost_resolver" view above :

zone "sarayaglobal.com" {
	type master;
	file "/var/named/sarayaglobal.com.db";
};


zone "lakanto.ru" {
	type master;
	file "/var/named/lakanto.ru.db";
};


zone "goodmaid.net" {
	type master;
	file "/var/named/goodmaid.net.db";
};


zone "saraya.com.my" {
	type master;
	file "/var/named/saraya.com.my.db";
};


zone "worldwide.saraya.com" {
	type master;
	file "/var/named/worldwide.saraya.com.db";
};


zone "sanistar.pro" {
	type master;
	file "/var/named/sanistar.pro.db";
};


zone "saraya.co.nz" {
	type master;
	file "/var/named/saraya.co.nz.db";
};




zone "saraya.com.cn" {
	type master;
	file "/var/named/saraya.com.cn.db";
};


zone "saraya.tw" {
	type master;
	file "/var/named/saraya.tw.db";
};


zone "saraya-eastafrica.com" {
	type master;
	file "/var/named/saraya-eastafrica.com.db";
};


zone "happyelephant.com.tw" {
	type master;
	file "/var/named/happyelephant.com.tw.db";
};


zone "arau.com.tw" {
	type master;
	file "/var/named/arau.com.tw.db";
};


zone "saraya-east-africa.com" {
	type master;
	file "/var/named/saraya-east-africa.com.db";
};


zone "araubaby.com.my" {
	type master;
	file "/var/named/araubaby.com.my.db";
};


zone "lakanto.com.my" {
	type master;
	file "/var/named/lakanto.com.my.db";
};


zone "lakanto.net.cn" {
	type master;
	file "/var/named/lakanto.net.cn.db";
};


zone "server.saraya-global.com" {
	type master;
	file "/var/named/server.saraya-global.com.db";
};


zone "cn.arau.jp" {
	type master;
	file "/var/named/cn.arau.jp.db";
};


zone "lakanto.com.au" {
	type master;
	file "/var/named/lakanto.com.au.db";
};


zone "saraya.pl" {
	type master;
	file "/var/named/saraya.pl.db";
};


zone "lactoferrinlab.com" {
	type master;
	file "/var/named/lactoferrinlab.com.db";
};


zone "happyelephant.info" {
	type master;
	file "/var/named/happyelephant.info.db";
};


zone "sarayakumo.com" {
	type master;
	file "/var/named/sarayakumo.com.db";
};


zone "saraya-europe.com" {
	type master;
	file "/var/named/saraya-europe.com.db";
};


zone "medical-marketplace.com" {
	type master;
	file "/var/named/medical-marketplace.com.db";
};


zone "saraya.mx" {
	type master;
	file "/var/named/saraya.mx.db";
};


zone "saraya.com.au" {
	type master;
	file "/var/named/saraya.com.au.db";
};


zone "saraya.world" {
	type master;
	file "/var/named/saraya.world.db";
};


zone "sarayamystair.in" {
	type master;
	file "/var/named/sarayamystair.in.db";
};


zone "sarayamystair.com" {
	type master;
	file "/var/named/sarayamystair.com.db";
};


zone "saraya.co.in" {
	type master;
	file "/var/named/saraya.co.in.db";
};


zone "lakanto.world" {
	type master;
	file "/var/named/lakanto.world.db";
};


zone "saraya.me" {
	type master;
	file "/var/named/saraya.me.db";
};


zone "saraya.co.ke" {
	type master;
	file "/var/named/saraya.co.ke.db";
};


zone "saraya.ug" {
	type master;
	file "/var/named/saraya.ug.db";
};

};

view    "external" {
/* This view will contain zones you want to serve only to "external" clients
 * that have addresses that are not on your directly attached LAN interface subnets:
 */
    recursion no;
    additional-from-cache no;
    // you'd probably want to deny recursion to external clients, so you don't
    // end up providing free DNS service to all takers

    // all views must contain the root hints zone:
    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    // These are your "authoritative" external zones, and would probably
    // contain entries for just your web and mail servers:

    // BEGIN external zone entries


zone "sarayaglobal.com" {
	type master;
	file "/var/named/sarayaglobal.com.db";
};


zone "lakanto.ru" {
	type master;
	file "/var/named/lakanto.ru.db";
};


zone "goodmaid.net" {
	type master;
	file "/var/named/goodmaid.net.db";
};


zone "saraya.com.my" {
	type master;
	file "/var/named/saraya.com.my.db";
};


zone "worldwide.saraya.com" {
	type master;
	file "/var/named/worldwide.saraya.com.db";
};


zone "sanistar.pro" {
	type master;
	file "/var/named/sanistar.pro.db";
};


zone "saraya.co.nz" {
	type master;
	file "/var/named/saraya.co.nz.db";
};




zone "saraya.com.cn" {
	type master;
	file "/var/named/saraya.com.cn.db";
};


zone "saraya.tw" {
	type master;
	file "/var/named/saraya.tw.db";
};


zone "saraya-eastafrica.com" {
	type master;
	file "/var/named/saraya-eastafrica.com.db";
};


zone "happyelephant.com.tw" {
	type master;
	file "/var/named/happyelephant.com.tw.db";
};


zone "arau.com.tw" {
	type master;
	file "/var/named/arau.com.tw.db";
};


zone "saraya-east-africa.com" {
	type master;
	file "/var/named/saraya-east-africa.com.db";
};


zone "araubaby.com.my" {
	type master;
	file "/var/named/araubaby.com.my.db";
};


zone "lakanto.com.my" {
	type master;
	file "/var/named/lakanto.com.my.db";
};


zone "lakanto.net.cn" {
	type master;
	file "/var/named/lakanto.net.cn.db";
};


zone "server.saraya-global.com" {
	type master;
	file "/var/named/server.saraya-global.com.db";
};


zone "cn.arau.jp" {
	type master;
	file "/var/named/cn.arau.jp.db";
};


zone "lakanto.com.au" {
	type master;
	file "/var/named/lakanto.com.au.db";
};


zone "saraya.pl" {
	type master;
	file "/var/named/saraya.pl.db";
};


zone "lactoferrinlab.com" {
	type master;
	file "/var/named/lactoferrinlab.com.db";
};


zone "happyelephant.info" {
	type master;
	file "/var/named/happyelephant.info.db";
};


zone "sarayakumo.com" {
	type master;
	file "/var/named/sarayakumo.com.db";
};


zone "saraya-europe.com" {
	type master;
	file "/var/named/saraya-europe.com.db";
};


zone "medical-marketplace.com" {
	type master;
	file "/var/named/medical-marketplace.com.db";
};


zone "saraya.mx" {
	type master;
	file "/var/named/saraya.mx.db";
};


zone "saraya.com.au" {
	type master;
	file "/var/named/saraya.com.au.db";
};


zone "saraya.world" {
	type master;
	file "/var/named/saraya.world.db";
};


zone "sarayamystair.in" {
	type master;
	file "/var/named/sarayamystair.in.db";
};


zone "sarayamystair.com" {
	type master;
	file "/var/named/sarayamystair.com.db";
};


zone "saraya.co.in" {
	type master;
	file "/var/named/saraya.co.in.db";
};


zone "lakanto.world" {
	type master;
	file "/var/named/lakanto.world.db";
};


zone "saraya.me" {
	type master;
	file "/var/named/saraya.me.db";
};


zone "saraya.co.ke" {
	type master;
	file "/var/named/saraya.co.ke.db";
};


zone "saraya.ug" {
	type master;
	file "/var/named/saraya.ug.db";
};

};

Sindbad File Manager Version 1.0, Coded By Sindbad EG ~ The Terrorists