[SCM] Samba Shared Repository - branch master updated

Björn Jacke bjacke at samba.org
Thu Aug 29 05:54:04 MDT 2013


The branch, master has been updated
       via  0ca9c74 provision: Rewrite named.txt to be more useful
      from  4dd1523 docs: Add man samba-regedit.8.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 0ca9c74f91d5e727d5d37d324d4f1b396e75b1ae
Author: Andrew Bartlett <abartlet at samba.org>
Date:   Wed Aug 28 13:35:47 2013 +1200

    provision: Rewrite named.txt to be more useful
    
    We already chown the dns.keytab file, so remove the suggestion to do that,
    and instead explain why we can not use chroot (an often-requested feature).
    
    Andrew Bartlett
    
    Signed-off-by: Andrew Bartlett <abartlet at samba.org>
    Signed-off-by: Björn Jacke <bj at sernet.de>
    
    Autobuild-User(master): Björn Jacke <bj at sernet.de>
    Autobuild-Date(master): Thu Aug 29 13:53:25 CEST 2013 on sn-devel-104

-----------------------------------------------------------------------

Summary of changes:
 source4/setup/named.txt |   36 ++++++++++++++++++++----------------
 1 files changed, 20 insertions(+), 16 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source4/setup/named.txt b/source4/setup/named.txt
index d0657dd..511bc67 100644
--- a/source4/setup/named.txt
+++ b/source4/setup/named.txt
@@ -12,20 +12,29 @@
 #    file:
 tkey-gssapi-keytab "${DNS_KEYTAB_ABS}";
 
+# 2. If SELinux is enabled, ensure that all files have the appropriate 
+#    SELinux file contexts.  The ${DNS_KEYTAB} file must be accessible by the 
+#    BIND daemon and should have a SELinux type of named_conf_t.  This can be 
+#    set with the following command:
+chcon -t named_conf_t ${DNS_KEYTAB_ABS}
+
+#    Even if not using SELinux, do confirm (only) BIND can access this file as the 
+#    user it becomes (generally not root).
+
 #
-# Common Steps for BIND 9.x.x --------------------------------------------
+# Steps for BIND 9.x.x using BIND9_DLZ ------------------------------
 #
 
-# 2. Set appropriate ownership and permissions on the ${DNS_KEYTAB} file.  
-#    Note that the most distributions have BIND configured to run under a 
-#    non-root user account.  For example, Fedora 9 runs BIND as the user 
-#    "named" once the daemon relinquishes its rights.  Therefore, the file 
-#    ${DNS_KEYTAB} must be readable by the user that BIND run as.  If BIND 
-#    is running as a non-root user, the "${DNS_KEYTAB}" file must have its 
-#    permissions altered to allow the daemon to read it.  Under Fedora 9, 
-#    execute the following commands:
-chgrp named ${DNS_KEYTAB_ABS}
-chmod g+r ${DNS_KEYTAB_ABS}
+# 3. Disable chroot support in BIND.  
+#    BIND is often configured to run in a chroot, but this is not
+#    compatible with access to the dns/sam.ldb files that database
+#    access and updates require.  Additionally, the DLZ plugin is
+#    linked to a large number of Samba shared libraries and loads
+#    additonal plugins.
+
+#
+# Steps for BIND 9.x.x using BIND9_FLATFILE ------------------------------
+#
 
 # 3. Ensure the BIND zone file(s) that will be dynamically updated are in 
 #    a directory where the BIND daemon can write.  When BIND performs 
@@ -38,8 +47,3 @@ chmod g+r ${DNS_KEYTAB_ABS}
 #    both example zone statements at the beginning of this file were changed 
 #    by prepending the directory "dynamic/".
 
-# 4. If SELinux is enabled, ensure that all files have the appropriate 
-#    SELinux file contexts.  The ${DNS_KEYTAB} file must be accessible by the 
-#    BIND daemon and should have a SELinux type of named_conf_t.  This can be 
-#    set with the following command:
-chcon -t named_conf_t ${DNS_KEYTAB_ABS}


-- 
Samba Shared Repository


More information about the samba-cvs mailing list