; -*- zone -*-
; this was generated by a Samba4 provision, and is typical
; of a AD DNS zone
$ORIGIN example.nil.
$TTL 1W
@ IN SOA blu hostmaster (
2010113027 ; serial
2D ; refresh
4H ; retry
6W ; expiry
1W ) ; minimum
IN NS blu
IN A 10.53.0.1
;
blu IN A 10.53.0.1
gc._msdcs IN A 10.53.0.1
fb33eb58-5d58-4100-a114-256e0a97ffc1._msdcs IN CNAME blu
;
; global catalog servers
_gc._tcp IN SRV 0 100 3268 blu
_gc._tcp.Default-First-Site-Name._sites IN SRV 0 100 3268 blu
_ldap._tcp.gc._msdcs IN SRV 0 100 3268 blu
_ldap._tcp.Default-First-Site-Name._sites.gc._msdcs IN SRV 0 100 3268 blu
;
; ldap servers
_ldap._tcp IN SRV 0 100 389 blu
_ldap._tcp.dc._msdcs IN SRV 0 100 389 blu
_ldap._tcp.pdc._msdcs IN SRV 0 100 389 blu
_ldap._tcp.d86745b4-f3e0-4af3-be03-2130d1534be8.domains._msdcs IN SRV 0 100 389 blu
_ldap._tcp.Default-First-Site-Name._sites IN SRV 0 100 389 blu
_ldap._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 389 blu
;
; krb5 servers
_kerberos._tcp IN SRV 0 100 88 blu
_kerberos._tcp.dc._msdcs IN SRV 0 100 88 blu
_kerberos._tcp.Default-First-Site-Name._sites IN SRV 0 100 88 blu
_kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 88 blu
_kerberos._udp IN SRV 0 100 88 blu
; MIT kpasswd likes to lookup this name on password change
_kerberos-master._tcp IN SRV 0 100 88 blu
_kerberos-master._udp IN SRV 0 100 88 blu
;
; kpasswd
_kpasswd._tcp IN SRV 0 100 464 blu
_kpasswd._udp IN SRV 0 100 464 blu
;
; heimdal 'find realm for host' hack
_kerberos IN TXT EXAMPLE.NIL