:M/S DNS 技术用与不同view获取电信与网通IP shell服务器端修改路由表bat

:

主DNSDNS请检查日志/var/log/messages 架设容易,还需要好好看管,至于这一部分,管理手册中的资料复制来来,(信号安全处理)

。它描述了配置文件

主要支持服务器对服务器之间通讯的TSIGnotify的支持较为有限。

TSIG 新,而基于IP -y 5.4.1产生一个共享的加密方式就是在host1 匙: “host1-host.1 位(16 好,但是较短的键比较容易读取。注意键的最大长度是512 化以产生128 文件中。文件不直接被调用,但是在”Key:”

BIND9字符串"La/E5CjG9O+os1jq2jdA==".2 编码的随机序列结果。大多数ASCII 的倍数,只有有效的字符被使用),所以共享密匙可以被手工

或者一个相似的程序以产生base-64 5.4.2这超过了DNS 、电话等。

是这2 台服务器。下列语句将会加到每个服务器中的named.conf file

算法。密匙就是在上面产生的这个。既然这是一个密匙,建议

中调用一个包含了密匙的不可读的文件。

标记的消息,它可以

5.4.4既然密匙只在两个主机之间共享,服务器就必须被告知什么时候使用keynamed.conf 地址是.3:

server.3 {

DNS 23

keys { host1-host2. ;};

};

可能是一个普遍可读文件。

标记。host1 标记的回复信息。

的地址),这样host2 的消息中标记相同的key 定义中使用IP 也拓展到允许使用TSIG

它只允许那些带有”host1-host更加强大的功能。

如果识别TSIG 标记,

服务器收到一个带着无效标记的信息,

。如果一台识别TSIG 标记的错误代码BADTIMENOTAUTH记住,主辅DNS时间差不能大于5分钟,最好做个网络同步时间服务.不过,我没做.嘿嘿~~

(1)

以下方法可以查询到3个服务商大致的地址范围,不过是否完整还需要大家验证。

下载并编译最新的ripe-dbase-client
# wget [url]http://ftp.apnic.net/apnic/dbase/tools/ripe-dbase-client-v3.tar.gz[/url]

#tar zxvf ripe-dbase*.gz
#cd whois-3.1
#./configure;make
执行查询并输出结果
#./whois3 -h whois.apnic.net -l -i mb MAINT-CNCGROUP >/tmp/cnc
#./whois3 -h whois.apnic.net -l -i mb MAINT-CHINANET >/tmp/chinanet
#./whois3 -h whois.apnic.net -l -i mb MAINT-CN-CRTC > /tmp/crtc

如果想得到具体的服务商比如江苏省电信的IP池,就把mb的值改为MAINT-CHINANET-JS,或者是辽宁网通,那就改为MAINT-CNCGROUP-LN

然后用grep sed去掉多余的文字就可以得到了。

(2)

#!/bin/sh

FILE=/root/study/apnic/ip_apnic

rm -f $FILE

wget [url]http://ftp.apnic.net/apnic/stats/apnic/delegated-apnic-latest[/url] -O $FILE

grep 'apnic|CN|ipv4|' $FILE | cut -f 4,5 -d'|'|sed -e 's/|/ /g' | while read ip

cnt

do

        echo $ip:$cnt

        mask=$(cat << EOF | bc | tail -1

pow=32;

define log2(x) {

if (x<=1) return (pow);

pow--;

return(log2(x/2));

}

log2($cnt)

EOF)

        echo $ip/$mask>> cn.net

        NETNAME=`whois $[email][email protected][/email] | sed -e '/./{H;$!d;}' -e 'x;/netnum/!d' |grep ^netname | sed -e 's/.*:      \(.*\)/\1/g' | sed -e 's/-.*//g'`

        case $NETNAME in

        CHINANET|CNCGROUP)

                echo $ip/$mask >> $NETNAME

        ;;

#如果你還要其他 ISP , 請在這邊加上去即可,透過 apnic whois , 你可以知道他的 NETNAME

        OTHER_NETNAME_here)

        ;;

        Esac

done

用于放在服务器端判定的.考略系统资源,就可以了.

REM Version 20060830,Copyright Netbank Co.LTD

@echo off

echo 正在关闭网通链路,请稍候...

REM CNC

route delete 58.16.0.0 mask 255.248.0.0

route delete 58.240.0.0 mask 255.240.0.0

route delete 60.0.0.0 mask 255.224.0.0

route delete 60.55.0.0 mask 255.255.0.0

route delete 60.208.0.0 mask 255.240.0.0

route delete 60.255.0.0 mask 255.255.0.0

route delete 61.48.0.0 mask 255.248.0.0

route delete 61.133.0.0 mask 255.255.128.0

route delete 61.134.0.0 mask 255.254.0.0

route delete 61.136.0.0 mask 255.255.128.0

route delete 61.137.128.0 mask 255.255.128.0

route delete 61.138.0.0 mask 255.255.128.0

route delete 61.138.128.0 mask 255.255.192.0

route delete 61.139.128.0 mask 255.255.192.0

route delete 61.148.0.0 mask 255.254.0.0

route delete 61.156.0.0 mask 255.255.0.0

route delete 61.158.0.0 mask 255.255.0.0

route delete 61.159.0.0 mask 255.255.192.0

route delete 61.161.0.0 mask 255.255.192.0

route delete 61.161.128.0 mask 255.255.128.0

route delete 61.162.0.0 mask 255.254.0.0

route delete 61.167.0.0 mask 255.255.0.0

route delete 61.168.0.0 mask 255.255.0.0

route delete 61.176.0.0 mask 255.255.0.0

route delete 61.179.0.0 mask 255.255.0.0

route delete 61.180.128.0 mask 255.255.128.0

route delete 61.181.0.0 mask 255.255.0.0

route delete 61.182.0.0 mask 255.255.0.0

route delete 61.189.0.0 mask 255.255.128.0

route delete 121.16.0.0 mask 255.240.0.0

route delete 121.89.0.0 mask 255.255.0.0

route delete 124.64.0.0 mask 255.254.0.0

route delete 124.66.0.0 mask 255.255.128.0

route delete 124.67.0.0 mask 255.255.0.0

route delete 124.88.0.0 mask 255.248.0.0

route delete 124.128.0.0 mask 255.248.0.0

route delete 124.160.0.0 mask 255.248.0.0

route delete 125.32.0.0 mask 255.240.0.0

route delete 202.38.143.0 mask 255.255.255.0

route delete 202.74.8.0 mask 255.255.248.0

route delete 202.75.208.0 mask 255.255.240.0

route delete 202.90.0.0 mask 255.255.0.0

route delete 202.96.0.0 mask 255.255.192.0

route delete 202.96.64.0 mask 255.255.224.0

route delete 202.97.128.0 mask 255.255.128.0

route delete 202.98.0.0 mask 255.255.224.0

route delete 202.99.0.0 mask 255.255.0.0

route delete 202.102.128.0 mask 255.255.128.0

route delete 202.106.0.0 mask 255.255.0.0

route delete 202.107.0.0 mask 255.255.128.0

route delete 202.108.0.0 mask 255.255.0.0

route delete 202.110.0.0 mask 255.255.0.0

route delete 202.111.128.0 mask 255.255.192.0

route delete 202.130.224.0 mask 255.255.224.0

route delete 203.93.8.0 mask 255.255.255.0

route delete 203.93.192.0 mask 255.255.192.0

route delete 203.175.192.0 mask 255.255.192.0

route delete 210.13.128.0 mask 255.255.128.0

route delete 210.14.160.0 mask 255.255.224.0

route delete 210.14.192.0 mask 255.255.224.0

route delete 210.15.32.0 mask 255.255.224.0

route delete 210.15.96.0 mask 255.255.224.0

route delete 210.15.128.0 mask 255.255.192.0

route delete 210.21.0.0 mask 255.255.0.0

route delete 210.22.0.0 mask 255.255.0.0

route delete 210.51.0.0 mask 255.255.0.0

route delete 210.52.0.0 mask 255.254.0.0

route delete 210.74.96.0 mask 255.255.224.0

route delete 210.74.128.0 mask 255.255.224.0

route delete 210.78.0.0 mask 255.255.224.0

route delete 210.82.0.0 mask 255.254.0.0

route delete 211.144.0.0 mask 255.254.0.0

route delete 211.152.0.0 mask 255.254.0.0

route delete 218.7.0.0 mask 255.255.0.0

route delete 218.8.0.0 mask 255.252.0.0

route delete 218.12.0.0 mask 255.255.0.0

route delete 218.21.128.0 mask 255.255.128.0

route delete 218.24.0.0 mask 255.252.0.0

route delete 218.28.0.0 mask 255.254.0.0

route delete 218.56.0.0 mask 255.252.0.0

route delete 218.60.0.0 mask 255.254.0.0

route delete 218.62.0.0 mask 255.255.128.0

route delete 218.67.128.0 mask 255.255.128.0

route delete 218.68.0.0 mask 255.254.0.0

route delete 218.104.0.0 mask 255.252.0.0

route delete 218.244.32.0 mask 255.255.224.0

route delete 218.247.0.0 mask 255.255.0.0

route delete 219.154.0.0 mask 255.254.0.0

route delete 219.156.0.0 mask 255.254.0.0

route delete 219.158.0.0 mask 255.255.0.0

route delete 219.159.0.0 mask 255.255.192.0

route delete 219.232.0.0 mask 255.252.0.0

route delete 220.248.0.0 mask 255.252.0.0

route delete 220.252.0.0 mask 255.255.0.0

route delete 221.0.0.0 mask 255.240.0.0

route delete 221.136.0.0 mask 255.255.0.0

route delete 221.192.0.0 mask 255.224.0.0

route delete 222.128.0.0 mask 255.240.0.0

route delete 222.160.0.0 mask 255.252.0.0

REM HZCNC

route delete 58.100.0.0 mask 255.254.0.0

route delete 125.210.0.0 mask 255.255.0.0

route delete 211.155.224.0 mask 255.255.240.0

route delete 218.108.0.0 mask 255.254.0.0

route delete 219.82.0.0 mask 255.255.0.0

REM CRC

route delete 61.232.0.0 mask 255.248.0.0

route delete 61.236.0.0 mask 255.254.0.0

route delete 211.98.0.0 mask 255.255.0.0

route delete 221.172.0.0 mask 255.252.0.0

route delete 222.32.0.0 mask 255.224.0.0

route delete 58.82.176.0 mask 255.255.240.0

route delete 58.82.224.0 mask 255.255.240.0

route delete 61.29.240.0 mask 255.255.240.0

route delete 121.46.0.0 mask 255.255.192.0

route delete 121.46.192.0 mask 255.255.224.0

route delete 122.198.32.0 mask 255.255.224.0

route delete 124.156.112.0 mask 255.255.240.0

route delete 124.156.128.0 mask 255.255.240.0

route delete 124.249.224.0 mask 255.255.240.0

REM UNICOM

route delete 61.240.0.0 mask 255.252.0.0

route delete 211.90.0.0 mask 255.254.0.0

route delete 211.92.0.0 mask 255.252.0.0

route delete 211.96.0.0 mask 255.254.0.0

route delete 220.192.0.0 mask 255.240.0.0

服务器安全,我将其iptables,

Service iptables start

至于其他资料,我以并打包.


如果想了解更多,请关注我们的公众号
公众号ID:opdevos
扫码关注

亲手架设Master/Slave智能DNS的流程_第1张图片