1 # Additional informations for DNS setup using BIND
3 # If you are running a capable version of BIND and you wish to support
4 # secure GSS-TSIG updates, you must make the following configuration
8 # Steps for BIND 9.8.x and 9.9.x -----------------------------------------
11 # 1. Insert following lines into the options {} section of your named.conf
13 tkey-gssapi-keytab "${DNS_KEYTAB_ABS}";
15 # 2. If SELinux is enabled, ensure that all files have the appropriate
16 # SELinux file contexts. The ${DNS_KEYTAB} file must be accessible by the
17 # BIND daemon and should have a SELinux type of named_conf_t. This can be
18 # set with the following command:
19 chcon -t named_conf_t ${DNS_KEYTAB_ABS}
21 # Even if not using SELinux, do confirm (only) BIND can access this file as the
22 # user it becomes (generally not root).
25 # Steps for BIND 9.x.x using BIND9_DLZ ------------------------------
28 # 3. Disable chroot support in BIND.
29 # BIND is often configured to run in a chroot, but this is not
30 # compatible with access to the dns/sam.ldb files that database
31 # access and updates require. Additionally, the DLZ plugin is
32 # linked to a large number of Samba shared libraries and loads
36 # Steps for BIND 9.x.x using BIND9_FLATFILE ------------------------------
39 # 3. Ensure the BIND zone file(s) that will be dynamically updated are in
40 # a directory where the BIND daemon can write. When BIND performs
41 # dynamic updates, it not only needs to update the zone file itself but
42 # it must also create a journal (.jnl) file to track the dynamic updates
43 # as they occur. Under Fedora 9, the /var/named directory can not be
44 # written to by the "named" user. However, the directory /var/named/dynamic
45 # directory does provide write access. Therefore the zone files were
46 # placed under the /var/named/dynamic directory. The file directives in
47 # both example zone statements at the beginning of this file were changed
48 # by prepending the directory "dynamic/".