- Introduction
- System Architecture
- Prerequisites
- Installation
- Configuration
- SSL Configuration
- Troubleshooting
- Advanced Usage
- Contributing
- License
This project sets up a local DNS infrastructure using CoreDNS, with one Debian server acting as the DNS server and two client VMs. The system is designed to use CoreDNS for local hostname resolution and fall back to 1.1.1.1 for internet queries. Additionally, it includes SSL configuration for secure local connections.
graph TD
A[CoreDNS Server] -->|DNS Queries| B(Client VM 1)
A -->|DNS Queries| C(Client VM 2)
A -->|Fallback| D{Internet DNS 1.1.1.1}
B -->|SSL| E[Local Services]
C -->|SSL| E
- 1 Debian VM for CoreDNS server
- 2 Client VMs (any Linux distribution)
- Root or sudo access on all VMs
- Basic understanding of DNS and networking
-
Download and install CoreDNS:
wget https://github.com/coredns/coredns/releases/download/v1.10.1/coredns_1.10.1_linux_amd64.tgz tar xzf coredns_1.10.1_linux_amd64.tgz sudo mv coredns /usr/local/bin/
-
Verify installation:
coredns -version
On each client VM, edit the /etc/resolv.conf
file:
sudo nano /etc/resolv.conf
Add the following content (replace 192.168.1.10
with your CoreDNS server's IP):
nameserver 192.168.1.10
nameserver 1.1.1.1
Create and edit the Corefile:
sudo mkdir /etc/coredns
sudo nano /etc/coredns/Corefile
Add the following content:
.:53 {
hosts {
192.168.1.10 server.local
192.168.1.20 client1.local
192.168.1.30 client2.local
fallthrough
}
forward . 1.1.1.1
log
errors
}
Create a SystemD service file:
sudo nano /etc/systemd/system/coredns.service
Add the following content:
[Unit]
Description=CoreDNS DNS server
After=network.target
[Service]
ExecStart=/usr/local/bin/coredns -conf /etc/coredns/Corefile
Restart=on-failure
[Install]
WantedBy=multi-user.target
Enable and start the service:
sudo systemctl daemon-reload
sudo systemctl enable coredns
sudo systemctl start coredns
Generate a self-signed certificate:
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 \
-keyout /etc/ssl/private/hostname.local.key \
-out /etc/ssl/certs/hostname.local.crt
Follow the prompts, ensuring you set the Common Name to "hostname.local".
If CoreDNS fails to start, try the following:
-
Check permissions:
ls -l /usr/local/bin/coredns sudo chmod +x /usr/local/bin/coredns
-
Verify Corefile:
cat /etc/coredns/Corefile
-
Run CoreDNS manually:
sudo /usr/local/bin/coredns -conf /etc/coredns/Corefile
-
Check logs:
sudo journalctl -u coredns.service
-
Check for port conflicts:
sudo lsof -i :53
-
Configure firewall:
sudo firewall-cmd --permanent --add-service=dns sudo firewall-cmd --reload
- Custom DNS records: Add more entries to the
hosts
section in the Corefile. - Plugins: CoreDNS supports various plugins. Explore the official documentation for more options.
It looks like the CoreDNS service is failing to start. The error suggests there might be an issue with the executable file or its permissions. Let's troubleshoot this step by step:
Make sure the file exists and has execute permissions. If it doesn't, you can set them with:
Ensure it matches what we set up earlier.
This should give us more detailed error information if there's a problem with the configuration.
This will show us the logs specific to the CoreDNS service.
If this works, you'll need to create proper SELinux policies instead of keeping it disabled.
If another service is using port 53, you'll need to stop that service or configure CoreDNS to use a different port.
You may need to add a rule to allow DNS traffic:
After trying these steps, attempt to start the service again:
If you're still encountering issues, please provide the output of steps 1, 3, and 4 from above. This will give us more information to diagnose the problem.