- Introduction
- System Architecture
- Prerequisites
- Installation
- Configuration
- SSL Configuration
- Troubleshooting
- Advanced Usage
- Contributing
- License
This project sets up a local DNS infrastructure using CoreDNS, with one Debian server acting as the DNS server and two client VMs. The system is designed to use CoreDNS for local hostname resolution and fall back to 1.1.1.1 for internet queries. Additionally, it includes SSL configuration for secure local connections.
graph TD
A[CoreDNS Server] -->|DNS Queries| B(Client VM 1)
A -->|DNS Queries| C(Client VM 2)
A -->|Fallback| D{Internet DNS 1.1.1.1}
B -->|SSL| E[Local Services]
C -->|SSL| E
- 1 Debian VM for CoreDNS server
- 2 Client VMs (any Linux distribution)
- Root or sudo access on all VMs
- Basic understanding of DNS and networking
-
Download and install CoreDNS:
wget https://github.com/coredns/coredns/releases/download/v1.10.1/coredns_1.10.1_linux_amd64.tgz tar xzf coredns_1.10.1_linux_amd64.tgz sudo mv coredns /usr/local/bin/
-
Verify installation:
coredns -version
On each client VM, edit the /etc/resolv.conf
file:
sudo nano /etc/resolv.conf
Add the following content (replace 192.168.1.10
with your CoreDNS server's IP):
nameserver 192.168.1.10
nameserver 1.1.1.1
Create and edit the Corefile:
sudo mkdir /etc/coredns
sudo nano /etc/coredns/Corefile
Add the following content:
.:53 {
hosts {
192.168.1.10 server.local
192.168.1.20 client1.local
192.168.1.30 client2.local
fallthrough
}
forward . 1.1.1.1
log
errors
}
Create a SystemD service file:
sudo nano /etc/systemd/system/coredns.service
Add the following content:
[Unit]
Description=CoreDNS DNS server
After=network.target
[Service]
ExecStart=/usr/local/bin/coredns -conf /etc/coredns/Corefile
Restart=on-failure
[Install]
WantedBy=multi-user.target
Enable and start the service:
sudo systemctl daemon-reload
sudo systemctl enable coredns
sudo systemctl start coredns
Generate a self-signed certificate:
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 \
-keyout /etc/ssl/private/hostname.local.key \
-out /etc/ssl/certs/hostname.local.crt
Follow the prompts, ensuring you set the Common Name to "hostname.local".
If CoreDNS fails to start, try the following:
-
Check permissions:
ls -l /usr/local/bin/coredns sudo chmod +x /usr/local/bin/coredns
-
Verify Corefile:
cat /etc/coredns/Corefile
-
Run CoreDNS manually:
sudo /usr/local/bin/coredns -conf /etc/coredns/Corefile
-
Check logs:
sudo journalctl -u coredns.service
-
Check for port conflicts:
sudo lsof -i :53
-
Configure firewall:
sudo firewall-cmd --permanent --add-service=dns sudo firewall-cmd --reload
- Custom DNS records: Add more entries to the
hosts
section in the Corefile. - Plugins: CoreDNS supports various plugins. Explore the official documentation for more options.
CoreDNS Setup for Local Network with SSL and Custom SELinux Policy
Table of Contents
Introduction
This project sets up a local DNS infrastructure using CoreDNS, with one Debian server acting as the DNS server and two client VMs. The system is designed to use CoreDNS for local hostname resolution and fall back to 1.1.1.1 for internet queries. Additionally, it includes SSL configuration for secure local connections and a custom SELinux policy for enhanced security.
[Sections 2-5 remain the same as in the previous version]
SELinux Configuration
To ensure CoreDNS functions correctly with SELinux enabled, follow these steps to create and apply a custom SELinux policy:
Ensure SELinux is in enforcing mode:
Start CoreDNS to generate audit logs:
Analyze SELinux audit logs:
sudo ausearch -c 'coredns' --raw
Generate a custom SELinux policy module:
Review the generated policy:
Apply the custom policy:
Set correct file contexts:
Configure SELinux boolean for network access:
Restart CoreDNS:
Verify CoreDNS is running:
Monitor for further SELinux denials:
sudo ausearch -c 'coredns' --raw
[Sections for SSL Configuration, Troubleshooting, Advanced Usage, Contributing, and License remain the same as in the previous version]