In order to test different CommIT environments, it is necessary to override the authoritative DNS server(s) for the commonidtrust.org domain with one that directs the user to the front door (loadbalancer) for the CPR and IDP instances in the desired environment. To that end, we have set up separate DNS servers for the CommIT VPC-Dev and VPC-Prod environments. These are configured to serve up the A and/or CNAME records for account.commonidtrust.org and login.commonidtrust.org for the specific VPC environment.
Currently, the DNS server for VPC-Dev runs on the CommIT VPC Gitolite server in the VPC-Dev public subnet and is accessible at EIP address 184.108.40.206. The DNS server for VPC-Prod runs on a t2.micro instance in the VPC-Prod public subnet and is accessible at EIP address 220.127.116.11.
yum -y install bind
Configure /etc/named.conf and zone files, /var/named/masters/commonidtrust-dev.local and /var/named/masters/commonidtrust.org (see examples for VPC-Dev attached).
chkconfig named on
named logs to /var/log/messages
Since users who need to leverage the VPC DNS servers are speckled around the internet and not accessing them from a well-defined IP address or CIDR block, we needed to leave the VPC DNS servers open to serve requests from anywhere. This is done by configuring:
Furthermore, once a client is configured to use these DNS servers, they may need to access additional name servers, for example, those for wisc.edu. We therefore configured:
Of course, it didn't take very long for some nefarious outfit to realize this and set up a DNS amplification attack (see https://www.us-cert.gov/ncas/alerts/TA13-088A) ricocheting off of our open DNS server. To resolve this, we include the rate-limit option.