2022-07-12 13:40:10 +00:00
|
|
|
From 402403b4bbb4f603693378e86b6c97997ccb0401 Mon Sep 17 00:00:00 2001
|
2020-06-18 02:08:57 +00:00
|
|
|
From: Petr Mensik <pemensik@redhat.com>
|
|
|
|
Date: Wed, 17 Jun 2020 23:17:13 +0200
|
|
|
|
Subject: [PATCH] Update man named with Red Hat specifics
|
|
|
|
|
|
|
|
This is almost unmodified text and requires revalidation. Some of those
|
|
|
|
statements are no longer correct.
|
|
|
|
---
|
2022-07-12 13:40:10 +00:00
|
|
|
bin/named/named.rst | 41 +++++++++++++++++++++++++++++++++++++++++
|
|
|
|
1 file changed, 41 insertions(+)
|
2020-06-18 02:08:57 +00:00
|
|
|
|
|
|
|
diff --git a/bin/named/named.rst b/bin/named/named.rst
|
2022-07-12 13:40:10 +00:00
|
|
|
index ea440b2..fa51984 100644
|
2020-06-18 02:08:57 +00:00
|
|
|
--- a/bin/named/named.rst
|
|
|
|
+++ b/bin/named/named.rst
|
2022-07-12 13:40:10 +00:00
|
|
|
@@ -212,6 +212,47 @@ Files
|
|
|
|
|named_pid|
|
2020-06-18 02:08:57 +00:00
|
|
|
The default process-id file.
|
|
|
|
|
|
|
|
+Notes
|
|
|
|
+~~~~~
|
|
|
|
+
|
|
|
|
+**Red Hat SELinux BIND Security Profile:**
|
|
|
|
+
|
2006-02-07 21:47:53 +00:00
|
|
|
+By default, Red Hat ships BIND with the most secure SELinux policy
|
|
|
|
+that will not prevent normal BIND operation and will prevent exploitation
|
2022-07-12 13:40:10 +00:00
|
|
|
+of all known BIND security vulnerabilities . See the selinux(8) man page
|
2006-02-07 21:47:53 +00:00
|
|
|
+for information about SElinux.
|
2020-06-18 02:08:57 +00:00
|
|
|
+
|
2006-02-07 21:47:53 +00:00
|
|
|
+It is not necessary to run named in a chroot environment if the Red Hat
|
|
|
|
+SELinux policy for named is enabled. When enabled, this policy is far
|
|
|
|
+more secure than a chroot environment. Users are recommended to enable
|
|
|
|
+SELinux and remove the bind-chroot package.
|
2020-06-18 02:08:57 +00:00
|
|
|
+
|
|
|
|
+*With this extra security comes some restrictions:*
|
|
|
|
+
|
2022-07-12 13:40:10 +00:00
|
|
|
+By default, the SELinux policy does not allow named to write any master
|
|
|
|
+zone database files. Only the root user may create files in the $ROOTDIR/var/named
|
|
|
|
+zone database file directory (the options { "directory" } option), where
|
|
|
|
+$ROOTDIR is set in /etc/sysconfig/named.
|
2020-06-18 02:08:57 +00:00
|
|
|
+
|
2016-05-26 15:23:15 +00:00
|
|
|
+The "named" group must be granted read privelege to
|
|
|
|
+these files in order for named to be enabled to read them.
|
2020-06-18 02:08:57 +00:00
|
|
|
+
|
2006-02-07 21:47:53 +00:00
|
|
|
+Any file created in the zone database file directory is automatically assigned
|
2020-06-18 02:08:57 +00:00
|
|
|
+the SELinux file context *named_zone_t* .
|
|
|
|
+
|
2022-07-12 13:40:10 +00:00
|
|
|
+By default, SELinux prevents any role from modifying *named_zone_t* files; this
|
|
|
|
+means that files in the zone database directory cannot be modified by dynamic
|
|
|
|
+DNS (DDNS) updates or zone transfers.
|
|
|
|
+
|
2007-06-04 13:44:35 +00:00
|
|
|
+The Red Hat BIND distribution and SELinux policy creates three directories where
|
2022-07-12 13:40:10 +00:00
|
|
|
+named is allowed to create and modify files: */var/named/slaves*, */var/named/dynamic*
|
|
|
|
+*/var/named/data*. By placing files you want named to modify, such as
|
|
|
|
+slave or DDNS updateable zone files and database / statistics dump files in
|
|
|
|
+these directories, named will work normally and no further operator action is
|
|
|
|
+required. Files in these directories are automatically assigned the '*named_cache_t*'
|
|
|
|
+file context, which SELinux allows named to write.
|
|
|
|
+
|
2020-06-18 02:08:57 +00:00
|
|
|
+
|
|
|
|
See Also
|
|
|
|
~~~~~~~~
|
|
|
|
|
|
|
|
--
|
2022-07-12 13:40:10 +00:00
|
|
|
2.34.1
|
2020-06-18 02:08:57 +00:00
|
|
|
|