绑定反向 ipv6 映射,dig 没有答案,SERVFAIL

Ram*_*uri 2 fedora ipv6 bind dig

我正在使用安装了 Bind 9 的 Fedora 17,尝试配置 DNS,但我已经解决了一个问题:

绑定DNS配置,dig命令不解析名称

现在 ipv4 和 ipv6 映射有效,反向 ipv4 映射也有效,但问题在于反向 ipv6。在我的 named.conf 文件中有这个区域:

zone "3.1.0.0.0.0.0.0.0.0.0.2.ip6.arpa" IN {
    type master;
    file "reverse6.zone";
};
Run Code Online (Sandbox Code Playgroud)

这是 reverse6.zone 文件:

$TTL 48h
$ORIGIN 3.1.0.0.0.0.0.0.0.0.0.2.ip6.arpa.
@       IN      SOA     gruppo13.labreti.it. master.gruppo13.labreti.it. (
    2013032511
    1d
    2h
    4w
    1h
)
    IN      NS      gruppo13.labreti.it.
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 IN  PTR gruppo13.labreti.it.
2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 IN  PTR dns.gruppo13.labreti.it.
8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 IN  PTR www.gruppo13.labreti.it.
3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 IN  PTR mail.gruppo13.labreti.it.
Run Code Online (Sandbox Code Playgroud)

使用 dig 我可以找到一个 ip6 地址,但如果我反过来:

$ dig -x AAAA 2000:0:d::1
Run Code Online (Sandbox Code Playgroud)

我没有得到答案,这是 dig 输出:

; <<>> DiG 9.9.2-rl.028.23-P1-RedHat-9.9.2-5.P1.fc17 <<>> -x AAAA 2000:0:d::1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 43454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;AAAA.in-addr.arpa.     IN  PTR

;; Query time: 17 msec
;; SERVER: 192.168.13.100#53(192.168.13.100)
;; WHEN: Tue Mar 26 14:02:39 2013
;; MSG SIZE  rcvd: 46

;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 17670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2000:0:d::1.           IN  A

;; Query time: 13 msec
;; SERVER: 192.168.13.100#53(192.168.13.100)
;; WHEN: Tue Mar 26 14:02:39 2013
;; MSG SIZE  rcvd: 40
Run Code Online (Sandbox Code Playgroud)

San*_*ann 5

您的命令无效。您正在查找 的倒数AAAA

;; QUESTION SECTION:
;AAAA.in-addr.arpa.     IN  PTR
Run Code Online (Sandbox Code Playgroud)

和的 IPv4 地址2000:0:d::1

;; QUESTION SECTION:
;2000:0:d::1.           IN  A
Run Code Online (Sandbox Code Playgroud)

你想要的是AAAA从你的命令中删除(并修复地址):

dig -x 2000:0:13::1
Run Code Online (Sandbox Code Playgroud)

这将发送正确的问题:

;; QUESTION SECTION:
;1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.1.0.0.0.0.0.0.0.0.0.2.ip6.arpa. IN PTR
Run Code Online (Sandbox Code Playgroud)

还记得2000:0:13::1吗?2000:0:d::1