LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 07-30-2007, 11:48 AM   #1
metallica1973
Senior Member
 
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190

Rep: Reputation: 60
Caching DNS and Hosting a Website


I use a Caching DNS server at my office and wanted to host my website on my own webserver instead of using a hosting company. My question is what to I have to due to get that going. From what I understand I have to tell the company where I have my domain parked to redirect there all DNS traffic to my DNS server? Also what do I have to do to my caching DNS server(bind) to get this to work. help!
 
Old 07-30-2007, 03:04 PM   #2
cucolin@
Member
 
Registered: Nov 2003
Location: USA
Distribution: Ubuntu, CentOS, RedHat
Posts: 416

Rep: Reputation: 31
At your domain registrar company control panel point your domain name to your server at home. You can take a look here: http://www.webhostingtalk.com/showthread.php?t=558645

good luck!
 
Old 07-30-2007, 03:10 PM   #3
metallica1973
Senior Member
 
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190

Original Poster
Rep: Reputation: 60
Is there any adjustments that I need to make on my caching DNS server to accomidate outside DNS requests other then to allow traffic to port 53?
 
Old 07-31-2007, 12:54 PM   #4
The_Dude
LQ Newbie
 
Registered: Jul 2007
Posts: 8

Rep: Reputation: 0
Quote:
Originally Posted by metallica1973
Is there any adjustments that I need to make on my caching DNS server to accomidate outside DNS requests other then to allow traffic to port 53?
You can not use a "caching DNS" to service your own zone. You need to create a DNS server that acts as the start of authority for your zone. If you are using Bind, create 2 views, an internal view to service your internal clients, and an external view to service any requests from the internet. You will need at least 2 public IP addresses for a master and a slave DNS server, and it would be preferable if they were located in different locations. You also need to make sure that your ISP will work with you on reverse DNS or if they won't, will they at least delegate to you your slice of the IP space. But I really have a suggestion for you. Instead of putting a DNS server out on the internet for it to get raped by people that are more knowledgeable or be cause of DNS pollution to the root servers, why don't you use a service that has DNS built in? Try the Canadian outfit, Easy DNS. It cost $20 USD a year, but you will not have to worry about attacks to your server. You can then concentrate on learning about zone creation, maintenance, and security. Once you have become comfortable with that then you can move onto learning BIND by installing you own on your net. If you try to do your own DNS server and learn BIND at the same time, and the in's and out's of dealing with your DNS ISP it can be a daunting experience. Try baby steps first.

much love,

The Dude.
 
Old 07-31-2007, 01:28 PM   #5
metallica1973
Senior Member
 
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190

Original Poster
Rep: Reputation: 60
here is another stupid question, how will using an external DNS hosting company forward traffic to my own web server hosting. Also Can I have a DNS server along with APACHE on the same server and only have port 53 and 80 open to the public. I really want to learn using BIND and APACHE for the future. If I stick my webserver/DNS on my DMZ and use decent IPTABLES rules set will that suffice as the basics for security? So essentially I will have an external DNS in my DMZ for web requests and have my internal DNS for internal request(Caching Server)! What do you think? I was planning on using VHOSTS in APACHE for a couple of websites so I will not need several IP's for each site.

Last edited by metallica1973; 07-31-2007 at 01:31 PM.
 
Old 07-31-2007, 05:42 PM   #6
The_Dude
LQ Newbie
 
Registered: Jul 2007
Posts: 8

Rep: Reputation: 0
Quote:
Originally Posted by metallica1973
here is another stupid question, how will using an external DNS hosting company forward traffic to my own web server hosting.
It won't "forward" any traffic at all, it will merily tell all DNS clients what IP your www.mydomain.com is located at.

Quote:
Originally Posted by metallica1973
Also Can I have a DNS server along with APACHE on the same server and only have port 53 and 80 open to the public.
You sure can. Just make sure that you are not running either service as root.


Quote:
Originally Posted by metallica1973
I really want to learn using BIND and APACHE for the future. If I stick my webserver/DNS on my DMZ and use decent IPTABLES rules set will that suffice as the basics for security?
Not really. I would set up the webserver and DNS internally only. Study up on both BIND and Apache httpd. Make sure that it is not externally accessible so that your network can not be abused. Both of the services that you are interested in are very easy to mis-configure and very easy to abuse, hence play with it internally. When you think you got it down, go external.

Quote:
Originally Posted by metallica1973
So essentially I will have an external DNS in my DMZ for web requests and have my internal DNS for internal request(Caching Server)! What do you think? I was planning on using VHOSTS in APACHE for a couple of websites so I will not need several IP's for each site.
It is do-able, but for your virtual hosts, are they all going to need SSL access? If none of them do, then, yeah, you can get away with only having only having one IP address.
 
Old 07-31-2007, 05:49 PM   #7
Hewson
Member
 
Registered: Feb 2007
Location: /home
Distribution: Kubuntu and CentOS
Posts: 214

Rep: Reputation: 32
Quote:
Originally Posted by The_Dude
Both of the services that you are interested in are very easy to mis-configure and very easy to abuse, hence play with it internally. When you think you got it down, go external.
What are the problem areas to look for? I've been contemplating locally hosting my site for a while. I've used Apache2 before, but i've never had to worry about security issues with it. The linux box will be behind a firewall that only forwards port 80 to the httpd server.
 
Old 08-04-2007, 05:40 PM   #8
The_Dude
LQ Newbie
 
Registered: Jul 2007
Posts: 8

Rep: Reputation: 0
Sorry, I did not respond quicker, I have been under quite a hectic work load.

Quote:
Originally Posted by Hewson
What are the problem areas to look for? I've been contemplating locally hosting my site for a while. I've used Apache2 before, but i've never had to worry about security issues with it. The linux box will be behind a firewall that only forwards port 80 to the httpd server.
If you are going to run any type of scripts, any Java, or database, then you will really need to make yourself knowledgeable on the security issues. On a normal HTML only site, I think the big worry would have been O/S security and Apache security. Locking the O/S and Apache down so there were no leaks of sensitive info (ie stuff like your /etc/passwd or /etc/shadow files being parsed, or .htaccess, etc.). If you are going to be hosting your own website on your own server, then you need to pay careful attention to file permissions and ownership, vulnerability alerts and their patches from the distributors, . You should also try to toughen the O/S and the TCP/IP stack. Most Linux distributions are suspectable to fork bombs and other attacks that use the system's resources up.

If you are going to be running any type of CGI script (stuff written in PHP, Perl, Python, etc.), Java, or database, then pay close attend to your config and code so that you do not open yourself up for cross site scripting or SQL injection in addition to the already mentioned stuff. I suggest that you go to sans.org and spend some time in the reading room. Also visit owasp.org and nist.gov and read the stuff there. Get the Ivan Ristic's book, Apache Security, and Ryan Barnett's book, Preventing Web Attacks with Apache and read them. Test your site/machine Nessus and with CIS bench mark tools. These sites and tools will really open your eyes up to how your computer can be pwned. Keep in mind that the Apache team is far more knowledgeable about their stuff than I or any of the other people here are, however, they managed to get themselves hacked back in 2000. The cause was careless configuration. Good luck with your site.
 
Old 08-06-2007, 10:55 AM   #9
Hewson
Member
 
Registered: Feb 2007
Location: /home
Distribution: Kubuntu and CentOS
Posts: 214

Rep: Reputation: 32
Thanks for the response. I will look into that. I'll probably be using php/MySQL and some python(zope/plone).

cheers.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Caching DNS and Website metallica1973 Linux - Networking 16 07-28-2007 10:57 AM
DNS and hosting website.. tiger.woods Ubuntu 6 04-11-2007 06:25 AM
dns caching? codec Linux - Networking 7 07-04-2005 06:02 PM
DNS still slow after installing caching DNS mooreted Linux - Networking 16 01-01-2004 12:18 AM
need help to set up caching only dns server to with bogus DNS entries ullas Linux - Networking 1 10-28-2003 01:54 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 05:31 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration