1、詳細描述一次加密通訊的過程,結合圖示最佳。
2、描述創建私有CA的過程,以及為客戶端發來的證書請求進行辦法證書。
3、描述DNS查詢過程以及DNS服務器類別。
4、搭建一套DNS服務器,負責解析magedu.com域名(自行設定主機名及IP)
(1)、能夠對一些主機名進行正向解析和逆向解析;
(2)、對子域cdn.magedu.com進行子域授權,子域負責解析對應子域中的主機名;
(3)、為了保證DNS服務系統的高可用性,請設計一套方案,并寫出詳細的實施過程。
1、 詳細描述一次加密通訊的過程,結合圖示最佳。
一次會話,發郵件,用戶和用戶之間的數據加密: (1)生成數據; (2)用單向加密數據生成特征碼; (3)用自己的私鑰加密特征碼放在數據后面; (4)生成臨時會話密鑰加密特征碼和數據; (5)用對方的公鑰加密臨時密鑰。
單向加密:只能加密,不能解密,提取數據指紋(特征碼),來保證數據的完整性,如上圖的第二步,單向加密的協議有MD5,SHA等 非對稱加密:公鑰和私鑰成對出現,私鑰必須本機器保存,用公鑰加密的數據,只能使用與之配對兒 的私鑰解密;反之亦然,數字簽名是私鑰加密特征碼,如上圖的第三步;實現對稱秘鑰交換,如上圖 第五步 對稱加密:加密和解密使用同樣的密鑰,實現數據加密,產生對稱密鑰,如上圖的第四步
2、描述創建私有CA的過程,以及為客戶端發來的證書請求進行辦法證書。
1、創建所需要的文件(在192.168.190.131) 2、CA自簽證書(在192.168.190.131) (1)生成私鑰文件(/etc/pki/CA/private/cakey.pem): (2)生成自簽證書(/etc/pki/CA/cacert.pem) 3、發證 (1)用到證書的主機生成證書請求(在192.168.190.135) 生成私鑰文件:(/tmp/test.key) 生成證書請求:(/tmp/test.csr) (2)把請求文件傳輸給CA(192.168.190.135) (3)CA簽署證書,并將證書還給請求者:(192.168.190.131)
下面開始創建CA(192.168.190.131):
[root@localhost ~]# ls /etc/pki/CA certs crl newcerts private [root@localhost ~]# cd !$ cd /etc/pki/CA
1、創建所需要的文件
[root@localhost CA]# touch index.txt [root@localhost CA]# echo 01 > serial [root@localhost CA]# cat !$ cat serial 01
2、CA自簽證書
(1)生成私鑰文件(/etc/pki/CA/private/cakey.pem):
[root@localhost CA]# ( umask 077;openssl genrsa -out /etc/pki/CA/private/cakey.pem 2048 ) Generating RSA private key, 2048 bit long modulus ...+++ ..................................+++ e is 65537 (0x10001) [root@localhost CA]# ll private/ total 4 -rw-------. 1 root root 1675 Sep 2 13:40 cakey.pem
(2)生成自簽證書(/etc/pki/CA/cacert.pem)
[root@localhost CA]# openssl req -new -x509 -key /etc/pki/CA/private/cakey.pem -days 7300 -out /etc/pki/CA/cacert.pem You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:CN State or Province Name (full name) []:Anhui Locality Name (eg, city) [Default City]:Hefei Organization Name (eg, company) [Default Company Ltd]:CANGE Organizational Unit Name (eg, section) []:Qixinban Common Name (eg, your name or your server's hostname) []:ca.change.com Email Address []:caadmin@change.com # cacert.pem是證書,內含CA公鑰
3、發證(在另一個主機上192.168.190.135)
(1)用到證書的主機生成證書請求
生成私鑰文件:(/tmp/test.key)
[root@localhost tmp]# ( umask 077;openssl genrsa -out /tmp/test.key 2048 ) Generating RSA private key, 2048 bit long modulus ...+++ ............................+++ e is 65537 (0x10001)
生成證書請求:(/tmp/test.csr)
[root@localhost tmp]# openssl req -new -key /tmp/test.key -days 365 -out /tmp/test.csr You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:CN State or Province Name (full name) []:Anhui Locality Name (eg, city) [Default City]:Hefei Organization Name (eg, company) [Default Company Ltd]:CANGE Organizational Unit Name (eg, section) []:Qixinban Common Name (eg, your name or your server's hostname) []:ca.change.com Email Address []:caadmin@change.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []:123456 An optional company name []:CANGE
(2)把請求文件傳輸給CA(192.168.190.135)
[root@localhost tmp]# scp /tmp/test.csr root@192.168.190.131:/tmp/
(3)CA簽署證書,并將證書還給請求者:(192.168.190.131)
[root@localhost CA]# openssl ca -in /tmp/test.csr -out /tmp/test.crt -days 365 Using configuration from /etc/pki/tls/openssl.cnf Check that the request matches the signature Signature ok Certificate Details: Serial Number: 1 (0x1) Validity Not Before: Sep 2 06:47:04 2016 GMT Not After : Sep 2 06:47:04 2017 GMT Subject: countryName = CN stateOrProvinceName = Anhui organizationName = CANGE organizationalUnitName = Qixinban commonName = ca.change.com emailAddress = caadmin@change.com X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate X509v3 Subject Key Identifier: 95:1B:A9:FC:E3:F9:03:A7:43:9F:FE:F5:1B:9D:1C:7C:DD:1B:71:2E X509v3 Authority Key Identifier: keyid:A0:D7:52:FE:07:17:91:62:F4:AC:AE:4E:77:E5:1E:44:92:D8:97:BE Certificate is to be certified until Sep 2 06:47:04 2017 GMT (365 days) Sign the certificate? [y/n]:y 1 out of 1 certificate requests certified, commit? [y/n]y Write out database with 1 new entries Data Base Updated
查看證書中信息:(index.txt)
[root@localhost CA]# cat index.txt serialV 170902064704Z 01 unknown /C=CN/ST=Anhui/O=CANGE/OU=Qixinban/CN=ca.change.com/emailAddress=caadmin@change.com02
3、描述DNS查詢過程以及DNS服務器類別。
一、DNS:(Domain Name Service)域名系統,因特網上作為域名和IP地址相互映射的一個分布式 數據庫,能夠使用戶更方便的訪問互聯網,而不用去記住能夠被機器直接讀取的IP數串。使用tcp/53 進行區域傳輸,udp/53進行查詢操作;根域名全球13臺服務器,頂級域名(國家級cn uk… ,通用級 org com net…,反向域),二級域名,三級域名 二、DNS查詢方法: 1、遞歸查詢:要求DNS直接給出域名對應的IP。 2、迭代查詢:通常是發生在DNS服務器間,當請求的域名不再自己所負責的解析范圍內,便開始從根 迭代直到查詢到相應解析為止。
三、DNS查詢過程: 服務器向根域名服務器發出查詢請求,根服務器返回可以查詢到的服務器列表,然后在向該服務器發 送相同的請求獲取結果。 Client –> hosts文件 –> DNS Service–>Local Cache –> DNS Server (recursion遞歸) –> Server Cache –> iteration(迭代) –>其他DNS服務器 四、DNS服務器類別: 1、主DNS服務器:維護所負責解析的域內解析庫服務器,解析庫由管理維護; 2、從DNS服務器:從主DNS服務器或其它的從DNS服務器那里區域傳輸一份解析庫; 3、緩存DNS服務器:為客戶端緩存客戶端曾經查詢的記錄,找不到時,DNS服務器去迭代查詢; 4、轉發器:當請求的DNS記錄不在自己所負責的解析區域時,交給轉發器處理,轉發器去迭代查詢。
4、搭建一套DNS服務器,負責解析magedu.com域名(自行設定主機名及IP)
(1)、能夠對一些主機名進行正向解析和逆向解析;
(2)、對子域cdn.magedu.com進行子域授權,子域負責解析對應子域中的主機名;
(3)、為了保證DNS服務系統的高可用性,請設計一套方案,并寫出詳細的實施過程。
首先,要給每個服務器安裝bind: [root@localhost ~]# yum install bind -y 主服務器(父域):192.168.190.131 magedu.com 從服務器:192.168.190.134 ns2.magedu.com 子域:192.168.190.135 cdn.magedu.com
(1)、能夠對一些主機名進行正向解析和逆向解析; 配置服務器的正解和反解,主服務器(父域):192.168.190.131 magedu.com (2)、對子域cdn.magedu.com進行子域授權,子域負責解析對應子域中的主機名; 子域:192.168.190.135 cdn.magedu.com (3)、為了保證DNS服務系統的高可用性,請設計一套方案,并寫出詳細的實施過程 配置主從服務器,從服務器:192.168.190.134 ns2.magedu.com
一、主服務器的配置(192.168.190.131)
1、 配置緩沖名稱服務器/etc/named.conf
[root@localhost ~]# vim /etc/named.conf options { // listen-on port 53 { 127.0.0.1; }; // listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { any; }; recursion yes; // dnssec-enable yes; // dnssec-validation yes; /* Path to ISC DLV key */ // bindkeys-file "/etc/named.iscdlv.key"; // managed-keys-directory "/var/named/dynamic"; }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/etc/named.rfc1912.zones"; include "/etc/named.root.key";
2、主DNS名稱服務器
(1)在主配置文件中定義區域 /etc/named.rfc1912.zones
[root@localhost ~]# vim /etc/named.conf #在最后面添加 zone "magedu.com" IN { # 正向解析 type master; # 類型為主DNS file "magedu.com.zone"; # 正向解析文件位置 };
(2)定義區域解析庫文件 /var/named/magedu.com.zone
[root@localhost ~]# vim /var/named/magedu.com.zone $TTL 8640 $ORIGIN magedu.com. @ IN SOA ns1.magedu.com. admin.magedu.com. ( # SOA字段 20160843001 # 版本號,同步一次+1 1H # 更新時間1h 2M # 更新失敗,重試更新時間 2min 3D # 更新失敗多長時間后此DNS失效時間3day 1D # 解析不到請求不予回復的時間 ) IN NS ns1.magedu.com. # 域名服務器 IN NS ns2.magedu.com. # 從服務器 IN MX 10 mx1.magedu.com. # 定義郵件服務器,10指優先級 ns1 IN A 192.168.190.131 # ns1域名服務器的IP地址 ns2 IN A 192.168.190.134 # ns2從服務器的IP地址 mx1 IN A 192.168.190.130 # mx1郵件服務器的IP地址 www IN A 192.168.190.132 # www.magedu.com的IP地址 cname IN CNAME www # 別名
檢查語法錯誤:
[root@localhost ~]# named-checkconf [root@localhost ~]# named-checkzone "magedu.com.zone" /var/named/magedu.com.zone zone magedu.com.zone/IN: magedu.com.zone/MX 'mx1.magedu.com' (out of zone) has no addresses records (A or AAAA) zone magedu.com.zone/IN: loaded serial 2016083001 OK
3、反向區域
(1)定義區域 /etc/named.rfc1912.zones
[root@localhost ~]# vim /etc/named.conf #在最后面添加 zone "190.168.192.in-addr.arpa" IN { # 反向解析 type master; # 類型為主DNS file "192.168.190.zone"; # 反向解析文件位置 };
(2)區域解析庫文件 /var/named/192.168.190.zone
$TTL 86440 @ IN SOA ns1.magedu.com. admin.magedu.com. ( 2016083001 1H 2M 3D 1D) IN NS ns1.magedu.com. 131 IN PTR ns1.magedu.com.
(3)更改兩個自定義區域文件的權限為640和屬組為named
[root@localhost ~]# chmod 640 /var/named/magedu.com.zone /var/named/192.168.190.zone [root@localhost ~]# chown :named /var/named/magedu.com.zone /var/named/192.168.190.zone
(4)重啟DNS,然后進行正向方向解析測試
[root@localhost ~]# service named restart Stopping named: [ OK ] Starting named: [ OK ] [root@localhost ~]# rndc reload server reload successful [root@localhost ~]# dig -t A www.magedu.com @192.168.190.131 # 正向解析 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.magedu.com @192.168.190.131 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16244 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;www.magedu.com. IN A ;; ANSWER SECTION: www.magedu.com. 86440 IN A 192.168.190.132 ;; AUTHORITY SECTION: magedu.com. 86440 IN NS ns1.magedu.com. ;; ADDITIONAL SECTION: ns1.magedu.com. 86440 IN A 192.168.190.131 ;; Query time: 1 msec ;; SERVER: 192.168.190.131#53(192.168.190.131) ;; WHEN: Thu Sep 1 10:46:07 2016 ;; MSG SIZE rcvd: 82 [root@localhost ~]# dig -x 192.168.190.131 @192.168.190.131 # 反向解析 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -x 192.168.190.131 @192.168.190.131 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10250 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;131.190.168.192.in-addr.arpa. IN PTR ;; ANSWER SECTION: 131.190.168.192.in-addr.arpa. 86440 IN PTR ns1.magedu.com. ;; AUTHORITY SECTION: 190.168.192.in-addr.arpa. 86440 IN NS ns1.magedu.com. ;; ADDITIONAL SECTION: ns1.magedu.com. 86440 IN A 192.168.190.131 ;; Query time: 0 msec ;; SERVER: 192.168.190.131#53(192.168.190.131) ;; WHEN: Thu Sep 1 10:47:23 2016 ;; MSG SIZE rcvd: 104
二、從服務器配置(192.168.190.134)
在上面的配置ns2的IP地址是192.168.190.134,把此服務器配置為從服務器。 注意:從服務器一定要在主服務器上通過NS體現出來,否則更新配置時,主服務無法主動通知從服務器。 從服務器不需要區域文件,只要在named.rfc1912.zone文件中配置區域,指定為slave ,并指定 masters的IP地址便可。同步成功后,自動會在/var/named/slaves/目錄下創建區域的文件。
1、主配置文件/etc/named.rfc1912.zone
[root@localhost ~]# vim /etc/named.rfc1912.zones # 在后面直接添加 zone "magedu.com" IN { type slave; masters { 192.168.190.131; }; file "slaves/magedu.com.zone"; }; [root@localhost ~]# service named restart Stopping named: [ OK ] Starting named: [ OK ]
2、查看從服務器同步過來的區域配置文件/var/named/slaves/magedu.com.zone
[root@localhost ~]# cat /var/named/slaves/magedu.com.zone $ORIGIN . $TTL 86440 ; 1 day 40 seconds magedu.com IN SOA ns1.magedu.com. admin.magedu.com. ( 2016083001 ; serial 3600 ; refresh (1 hour) 120 ; retry (2 minutes) 259200 ; expire (3 days) 86400 ; minimum (1 day) ) NS ns1.magedu.com. NS ns2.magedu.com. MX 10 mx1.magedu.com. $ORIGIN magedu.com. cname CNAME www mx1 A 192.168.190.130 ns1 A 192.168.190.131 ns2 A 192.168.190.134 www A 192.168.190.132
3、反解從服務器的配置/etc/named.rfc1912.zones
[root@localhost ~]# vim /etc/named.rfc1912.zones # 直接在后面添加 zone "190.168.192.in-addr.arpa" IN { type slave; masters { 192.168.190.131; }; file "slaves/192.168.190.zone"; }; [root@localhost ~]# service named restart Stopping named: . [ OK ] Starting named: [ OK ]
查看日志文件 /var/log/messages
[root@localhost ~]# tail /var/log/messages
4、查看同步過來的反解區域配置文件/var/named/slaves/192.168.190.zone
[root@localhost ~]# cat /var/named/slaves/192.168.190.zone $ORIGIN . $TTL 86440 ; 1 day 40 seconds 190.168.192.in-addr.arpa IN SOA ns1.magedu.com. admin.magedu.com. ( 2016083001 ; serial 3600 ; refresh (1 hour) 120 ; retry (2 minutes) 259200 ; expire (3 days) 86400 ; minimum (1 day) ) NS ns1.magedu.com. $ORIGIN 190.168.192.in-addr.arpa. 131 PTR ns1.magedu.com.
三、子域授權
1、在父域(192.168.190.131):
(1)緩存名稱服務器: /etc/named.conf 通過forward啟動全局轉發,轉發給上層172.16.92.20。 如果此父域能夠訪問根域服務器,此可配可不配。 [root@localhost ~]# vim /etc/named.conf # 在options里面添加 forward first; forwarders { 172.16.92.20; }; dnssec-enable no; dnssec-validation no;
(2)在區域解析庫文件添加授權子域:/var/named/magedu.com.zone [root@localhost ~]# vim /var/named/magedu.com.zone IN NS centos cdn.magedu.com. IN NS centos.cdn.magedu.com.#子域名稱服務器 centos.cdn.magedu.com. IN A 192.168.190.135#子域名稱服務器主機記錄 [root@localhost ~]# rndc reload server reload successful
2、 子域 192.168.190.135:
(1)緩存名稱服務器:/etc/named.conf
[root@localhost ~]# vim /etc/named.conf options { // listen-on port 53 { 127.0.0.1; }; // listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { any; }; recursion yes; dnssec-enable no; dnssec-validation no; /* Path to ISC DLV key */ /* Path to ISC DLV key */ // bindkeys-file "/etc/named.iscdlv.key"; // managed-keys-directory "/var/named/dynamic"; }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; #zone "magedu.com" IN { # type forward; # forward only; # type forwarders { 192.168.190.131; }; #};
(2)在主配置文件中定義區域:/etc/named.rfc1912.zones
[root@localhost ~]# vim /etc/named.rfc1912.zones # 在后面直接添加 zone "cdn.magedu.com" IN { type master; file "cdn.magedu.com.zone"; };
(3)定義區域解析庫文件:/var/named/cdn.magedu.com.zone
[root@localhost ~]# vim /var/named/cdn.magedu.com.zone $TTL 86440 $ORIGIN cdn.magedu.com. @ IN SOA centos.cdn.magedu.com. admin.centos.cdn.magedu.com. ( 2016083001 1H 2M 3D 1D) IN NS centos.cdn.magedu.com. centos IN A 192.168.190.135 www IN A 192.168.190.132 * IN A 192.168.190.132
(4)更改區域文件的權限為640和屬組為named
[root@localhost ~]# chmod 640 /var/named/cdn.magedu.com.zone [root@localhost ~]# chown :named !$ chown :named /var/named/cdn.magedu.com.zone [root@localhost ~]# service named restart Stopping named: [ OK ] Starting named: [ OK ]
(5)重啟DNS并檢驗結果
[root@localhost ~]# rndc reload server reload successful [root@localhost ~]# rndc status version: 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 CPUs found: 1 worker threads: 1 number of zones: 20 debug level: 0 xfers running: 0 xfers deferred: 0 soa queries in progress: 0 query logging is OFF recursive clients: 0/0/1000 tcp clients: 0/100 server is up and running 測試: [root@localhost ~]# dig -t NS cdn.magedu.com @192.168.190.135 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t NS cdn.magedu.com @192.168.190.135 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 2745 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; QUESTION SECTION: ;cdn.magedu.com. IN NS ;; ANSWER SECTION: cdn.magedu.com. 86440 IN NS centos.cdn.magedu.com. ;; ADDITIONAL SECTION: centos.cdn.magedu.com. 86440 IN A 192.168.190.135 ;; Query time: 1 msec ;; SERVER: 192.168.190.135#53(192.168.190.135) ;; WHEN: Thu Sep 1 19:12:06 2016 ;; MSG SIZE rcvd: 69 [root@localhost ~]# dig -t A centos.cdn.magedu.com @192.168.190.135 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A centos.cdn.magedu.com @192.168.190.135 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9330 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;; QUESTION SECTION: ;centos.cdn.magedu.com. IN A ;; ANSWER SECTION: centos.cdn.magedu.com. 86440 IN A 192.168.190.135 ;; AUTHORITY SECTION: cdn.magedu.com. 86440 IN NS centos.cdn.magedu.com. ;; Query time: 0 msec ;; SERVER: 192.168.190.135#53(192.168.190.135) ;; WHEN: Thu Sep 1 19:15:04 2016 ;; MSG SIZE rcvd: 69 [root@localhost ~]# dig -t A www.cdn.magedu.com @192.168.190.135 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.cdn.magedu.com @192.168.190.135 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25602 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1 ;; QUESTION SECTION: ;www.cdn.magedu.com. IN A ;; ANSWER SECTION: www.cdn.magedu.com. 86440 IN A 192.168.190.132 ;; AUTHORITY SECTION: cdn.magedu.com. 86440 IN NS centos.cdn.magedu.com. ;; ADDITIONAL SECTION: centos.cdn.magedu.com. 86440 IN A 192.168.190.135 ;; Query time: 0 msec ;; SERVER: 192.168.190.135#53(192.168.190.135) ;; WHEN: Thu Sep 1 19:22:47 2016 ;; MSG SIZE rcvd: 89 [root@localhost ~]# dig -t A www.magedu.com @192.168.190.131 ; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.magedu.com @192.168.190.131 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20167 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2 ;; QUESTION SECTION: ;www.magedu.com. IN A ;; ANSWER SECTION: www.magedu.com. 86440 IN A 192.168.190.132 ;; AUTHORITY SECTION: magedu.com. 86440 IN NS ns2.magedu.com. magedu.com. 86440 IN NS ns1.magedu.com. ;; ADDITIONAL SECTION: ns1.magedu.com. 86440 IN A 192.168.190.131 ns2.magedu.com. 86440 IN A 192.168.190.134 ;; Query time: 1 msec ;; SERVER: 192.168.190.131#53(192.168.190.131) ;; WHEN: Thu Sep 1 19:23:29 2016 ;; MSG SIZE rcvd: 116
原創文章,作者:二極管,如若轉載,請注明出處:http://www.www58058.com/43368
有圖有文字,思路清晰,贊。