regenerate for non-DBUS builds
This commit is contained in:
		
							parent
							
								
									240066fa9a
								
							
						
					
					
						commit
						667fce216d
					
				
							
								
								
									
										78
									
								
								bind-9.3.2-redhat_doc.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										78
									
								
								bind-9.3.2-redhat_doc.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,78 @@ | |||||||
|  | --- bind-9.3.2/bin/named/named.8.redhat_doc	2005-10-12 22:33:46.000000000 -0400
 | ||||||
|  | +++ bind-9.3.2/bin/named/named.8	2006-02-07 15:56:31.000000000 -0500
 | ||||||
|  | @@ -169,6 +169,75 @@
 | ||||||
|  |  .TP | ||||||
|  |  \fI/var/run/named.pid\fR | ||||||
|  |  The default process\-id file. | ||||||
|  | +.PP
 | ||||||
|  | +.SH "NOTES"
 | ||||||
|  | +.PP
 | ||||||
|  | +.TP
 | ||||||
|  | +\fBRed Hat SELinux BIND Security Profile:\fR
 | ||||||
|  | +.PP
 | ||||||
|  | +By default, Red Hat ships BIND with the most secure SELinux policy
 | ||||||
|  | +that will not prevent normal BIND operation and will prevent exploitation
 | ||||||
|  | +of all known BIND security vulnerabilities . See the selinux(8) man page
 | ||||||
|  | +for information about SElinux.
 | ||||||
|  | +.PP
 | ||||||
|  | +It is not necessary to run named in a chroot environment if the Red Hat
 | ||||||
|  | +SELinux policy for named is enabled. When enabled, this policy is far
 | ||||||
|  | +more secure than a chroot environment. Users are recommended to enable
 | ||||||
|  | +SELinux and remove the bind-chroot package.
 | ||||||
|  | +.PP
 | ||||||
|  | +With this extra security comes some restrictions:
 | ||||||
|  | +.PP
 | ||||||
|  | +By default, the SELinux policy does not allow named to write any master
 | ||||||
|  | +zone database files. Only the root user may create files in the $ROOTDIR/var/named
 | ||||||
|  | +zone database file directory (the options { "directory" } option), where
 | ||||||
|  | +$ROOTDIR is set in /etc/sysconfig/named.
 | ||||||
|  | +.PP
 | ||||||
|  | +The "named" group must be granted read privelege to 
 | ||||||
|  | +these files in order for named to be enabled to read them. 
 | ||||||
|  | +.PP
 | ||||||
|  | +Any file created in the zone database file directory is automatically assigned
 | ||||||
|  | +the SELinux file context named_zone_t .
 | ||||||
|  | +.PP
 | ||||||
|  | +By default, SELinux prevents any role from modifying named_zone_t files; this
 | ||||||
|  | +means that files in the zone database directory cannot be modified by dynamic
 | ||||||
|  | +DNS (DDNS) updates or zone transfers.
 | ||||||
|  | +.PP
 | ||||||
|  | +The Red Hat BIND distribution and SELinux policy creates two directories where
 | ||||||
|  | +named is allowed to create and modify files: $ROOTDIR/var/named/slaves and
 | ||||||
|  | +$ROOTDIR/var/named/data. By placing files you want named to modify, such as
 | ||||||
|  | +slave or DDNS updateable zone files and database / statistics dump files in 
 | ||||||
|  | +these directories, named will work normally and no further operator action is
 | ||||||
|  | +required. Files in these directories are automatically assigned the 'named_cache_t'
 | ||||||
|  | +file context, which SELinux allows named to write.
 | ||||||
|  | +.PP
 | ||||||
|  | +You can enable the named_t domain to write and create named_zone_t files by use
 | ||||||
|  | +of the SELinux tunable boolean variable "named_write_master_zones", using the
 | ||||||
|  | +setsebool(8) command or the system-config-security GUI . If you do this, you
 | ||||||
|  | +must also set the ENABLE_ZONE_WRITE variable in /etc/sysconfig/named to 
 | ||||||
|  | +1 / yes to set the ownership of files in the $ROOTDIR/var/named directory
 | ||||||
|  | +to named:named in order for named to be allowed to write them. 
 | ||||||
|  | +.PP
 | ||||||
|  | +\fBRed Hat BIND named_sdb SDB support:\fR
 | ||||||
|  | +.PP
 | ||||||
|  | +Red Hat ships the bind-sdb RPM that provides the /usr/sbin/named_sdb program,
 | ||||||
|  | +which is named compiled with the Simplified Database Backend modules that ISC
 | ||||||
|  | +provides in the "contrib/sdb" directory.
 | ||||||
|  | +.PP
 | ||||||
|  | +The SDB modules for LDAP, PostGreSQL and DirDB are compiled into named_sdb.
 | ||||||
|  | +.PP
 | ||||||
|  | +To run named_sdb, set the ENABLE_SDB variable in /etc/sysconfig/named to 1 or "yes",
 | ||||||
|  | +and then the "service named start" named initscript will run named_sdb instead
 | ||||||
|  | +of named .
 | ||||||
|  | +.PP
 | ||||||
|  | +See the documentation for the various SDB modules in /usr/share/doc/bind-sdb-*/ .
 | ||||||
|  | +.br
 | ||||||
|  | +.PP
 | ||||||
|  | +\fBRed Hat system-config-bind:\fR
 | ||||||
|  | +.PP
 | ||||||
|  | +Red Hat provides the system-config-bind GUI to configure named.conf and zone
 | ||||||
|  | +database files. Run the "system-config-bind" command and access the manual
 | ||||||
|  | +by selecting the Help menu.
 | ||||||
|  | +.PP
 | ||||||
|  |  .SH "SEE ALSO" | ||||||
|  |  .PP | ||||||
|  |  RFC 1033, | ||||||
		Loading…
	
		Reference in New Issue
	
	Block a user