; -*- zone -*- ; this was generated by a Samba4 provision, and is typical ; of a AD DNS zone $ORIGIN example.nil. $TTL 1W @ IN SOA blu hostmaster ( 2010113027 ; serial 2D ; refresh 4H ; retry 6W ; expiry 1W ) ; minimum IN NS blu IN A 10.53.0.1 ; blu IN A 10.53.0.1 gc._msdcs IN A 10.53.0.1 fb33eb58-5d58-4100-a114-256e0a97ffc1._msdcs IN CNAME blu ; ; global catalog servers _gc._tcp IN SRV 0 100 3268 blu _gc._tcp.Default-First-Site-Name._sites IN SRV 0 100 3268 blu _ldap._tcp.gc._msdcs IN SRV 0 100 3268 blu _ldap._tcp.Default-First-Site-Name._sites.gc._msdcs IN SRV 0 100 3268 blu ; ; ldap servers _ldap._tcp IN SRV 0 100 389 blu _ldap._tcp.dc._msdcs IN SRV 0 100 389 blu _ldap._tcp.pdc._msdcs IN SRV 0 100 389 blu _ldap._tcp.d86745b4-f3e0-4af3-be03-2130d1534be8.domains._msdcs IN SRV 0 100 389 blu _ldap._tcp.Default-First-Site-Name._sites IN SRV 0 100 389 blu _ldap._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 389 blu ; ; krb5 servers _kerberos._tcp IN SRV 0 100 88 blu _kerberos._tcp.dc._msdcs IN SRV 0 100 88 blu _kerberos._tcp.Default-First-Site-Name._sites IN SRV 0 100 88 blu _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs IN SRV 0 100 88 blu _kerberos._udp IN SRV 0 100 88 blu ; MIT kpasswd likes to lookup this name on password change _kerberos-master._tcp IN SRV 0 100 88 blu _kerberos-master._udp IN SRV 0 100 88 blu ; ; kpasswd _kpasswd._tcp IN SRV 0 100 464 blu _kpasswd._udp IN SRV 0 100 464 blu ; ; heimdal 'find realm for host' hack _kerberos IN TXT EXAMPLE.NIL