Revision [3162]
This is an old revision of API BindACL made by JeffTaylor on 2014-03-19 13:40:19.
BIND9 Access Control Lists
Administrators running open Tier1 and Tier2 servers may wish to make use of the automatically-generated ACL file. This file is a BIND-formatted ACL which has listings for Tier1 addresses, Tier2 addresses, and whitelisted user IP addresses. Each list may be combined as desired to control access to your server.
If you are a Tier1 or Tier2 administrator and need access to this feature, please contact Shdwdrgn on the mailing list or IRC. Once you have access, you may log in to the members page and you will be shown a wget command with your username and a hash key for authentication:
wget --no-check-certificate -qO- "https://api.opennicproject.org/acl/bind/?user=myUser&auth=myHash curl --insecure --data "user=myUser&auth=myHash" https://api.opennicproject.org/acl/bind/
There is also a hash file provided to validate the information you receive. You may also use the hash to signal when the ACL has been updated. Typically you would check the hash once every minute for changes, and only download the new ACL when it has been updated. The hash may be accessed in the same manner as the ACL file:
wget --no-check-certificate -qO- "https://api.opennicproject.org/acl/hash/?user=myUser&auth=myHash curl --insecure --data "user=myUser&auth=myHash" https://api.opennicproject.org/acl/hash/
Note that this page currently uses a self-signed certificate, thus the need for the flags in the wget and curl commands. These will be removed from documentation once an official certificate has been applied to api.opennicproject.org.