[SCM] Samba Shared Repository - branch master updated
Björn Jacke
bjacke at samba.org
Thu Aug 29 05:54:04 MDT 2013
The branch, master has been updated
via 0ca9c74 provision: Rewrite named.txt to be more useful
from 4dd1523 docs: Add man samba-regedit.8.
http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master
- Log -----------------------------------------------------------------
commit 0ca9c74f91d5e727d5d37d324d4f1b396e75b1ae
Author: Andrew Bartlett <abartlet at samba.org>
Date: Wed Aug 28 13:35:47 2013 +1200
provision: Rewrite named.txt to be more useful
We already chown the dns.keytab file, so remove the suggestion to do that,
and instead explain why we can not use chroot (an often-requested feature).
Andrew Bartlett
Signed-off-by: Andrew Bartlett <abartlet at samba.org>
Signed-off-by: Björn Jacke <bj at sernet.de>
Autobuild-User(master): Björn Jacke <bj at sernet.de>
Autobuild-Date(master): Thu Aug 29 13:53:25 CEST 2013 on sn-devel-104
-----------------------------------------------------------------------
Summary of changes:
source4/setup/named.txt | 36 ++++++++++++++++++++----------------
1 files changed, 20 insertions(+), 16 deletions(-)
Changeset truncated at 500 lines:
diff --git a/source4/setup/named.txt b/source4/setup/named.txt
index d0657dd..511bc67 100644
--- a/source4/setup/named.txt
+++ b/source4/setup/named.txt
@@ -12,20 +12,29 @@
# file:
tkey-gssapi-keytab "${DNS_KEYTAB_ABS}";
+# 2. If SELinux is enabled, ensure that all files have the appropriate
+# SELinux file contexts. The ${DNS_KEYTAB} file must be accessible by the
+# BIND daemon and should have a SELinux type of named_conf_t. This can be
+# set with the following command:
+chcon -t named_conf_t ${DNS_KEYTAB_ABS}
+
+# Even if not using SELinux, do confirm (only) BIND can access this file as the
+# user it becomes (generally not root).
+
#
-# Common Steps for BIND 9.x.x --------------------------------------------
+# Steps for BIND 9.x.x using BIND9_DLZ ------------------------------
#
-# 2. Set appropriate ownership and permissions on the ${DNS_KEYTAB} file.
-# Note that the most distributions have BIND configured to run under a
-# non-root user account. For example, Fedora 9 runs BIND as the user
-# "named" once the daemon relinquishes its rights. Therefore, the file
-# ${DNS_KEYTAB} must be readable by the user that BIND run as. If BIND
-# is running as a non-root user, the "${DNS_KEYTAB}" file must have its
-# permissions altered to allow the daemon to read it. Under Fedora 9,
-# execute the following commands:
-chgrp named ${DNS_KEYTAB_ABS}
-chmod g+r ${DNS_KEYTAB_ABS}
+# 3. Disable chroot support in BIND.
+# BIND is often configured to run in a chroot, but this is not
+# compatible with access to the dns/sam.ldb files that database
+# access and updates require. Additionally, the DLZ plugin is
+# linked to a large number of Samba shared libraries and loads
+# additonal plugins.
+
+#
+# Steps for BIND 9.x.x using BIND9_FLATFILE ------------------------------
+#
# 3. Ensure the BIND zone file(s) that will be dynamically updated are in
# a directory where the BIND daemon can write. When BIND performs
@@ -38,8 +47,3 @@ chmod g+r ${DNS_KEYTAB_ABS}
# both example zone statements at the beginning of this file were changed
# by prepending the directory "dynamic/".
-# 4. If SELinux is enabled, ensure that all files have the appropriate
-# SELinux file contexts. The ${DNS_KEYTAB} file must be accessible by the
-# BIND daemon and should have a SELinux type of named_conf_t. This can be
-# set with the following command:
-chcon -t named_conf_t ${DNS_KEYTAB_ABS}
--
Samba Shared Repository
More information about the samba-cvs
mailing list