55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; -*- zone -*-
e2ec0753ce8ed53c870141541b34ebb44598cef7Tinderbox User; this was generated by a Samba4 provision, and is typical
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; of a AD DNS zone
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews$ORIGIN example.nil.
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews$TTL 1W
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews@ IN SOA blu hostmaster (
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt 2010113027 ; serial
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt 2D ; refresh
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt 4H ; retry
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt 6W ; expiry
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt 1W ) ; minimum
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt IN NS blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt IN A 10.53.0.1
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt
55e5c51e661e23e24573db84114a3837817745c9Evan Huntblu IN A 10.53.0.1
55e5c51e661e23e24573db84114a3837817745c9Evan Huntgc._msdcs IN A 10.53.0.1
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt
55e5c51e661e23e24573db84114a3837817745c9Evan Huntfb33eb58-5d58-4100-a114-256e0a97ffc1._msdcs IN CNAME blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; global catalog servers
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_gc._tcp IN SRV 0 100 3268 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_gc._tcp.Default-First-Site-Name._sites IN SRV 0 100 3268 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.gc._msdcs IN SRV 0 100 3268 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.Default-First-Site-Name._sites.gc._msdcs IN SRV 0 100 3268 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; ldap servers
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.dc._msdcs IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.pdc._msdcs IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.d86745b4-f3e0-4af3-be03-2130d1534be8.domains._msdcs IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.Default-First-Site-Name._sites IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_ldap._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 389 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; krb5 servers
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos._tcp IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos._tcp.dc._msdcs IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos._tcp.Default-First-Site-Name._sites IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos._udp IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; MIT kpasswd likes to lookup this name on password change
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos-master._tcp IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos-master._udp IN SRV 0 100 88 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; kpasswd
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kpasswd._tcp IN SRV 0 100 464 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kpasswd._udp IN SRV 0 100 464 blu
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt;
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt; heimdal 'find realm for host' hack
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt_kerberos IN TXT EXAMPLE.NIL
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt