Re: CentOS 6 as DNS-Server

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 10.05.2016 18:57, Александр Кириллов wrote:
this seems to be relevant in chroot environments;

as I noticed when configuring the DDNS-feature, that this is a little bit weired, when running in a chroot environment; I saw the recommendation not to use a chroot in the man-page and removed bind-chroot and then the zone
updates worked perfekt;

so this file /etc/named.root.key isn't really used; or am I missing
something?

These files are included in both my /etc/named.conf and /usr/share/doc/bind-x.x.x/named.conf.default which I probably used as a template years ago. I'm no dns expert but you'd probably need these files when accessing root servers directly without use of forwarders.

I'm also using ddns and have my zone files in /var/named/chroot/var/named/dynamic.
are you using DDNS in DualStack (IPv4 and IPv6 together) or do you have only DHCP or DHCPv6 and not both?
Selinux is enabled and I don't see any additional bind-related rules in my local policy or /etc/selinux/targeted/contexts/files/file_contexts.local.


the manpage shows this:

"NOTES
       Red Hat SELinux BIND Security Profile:

By default, Red Hat ships BIND with the most secure SELinux policy that will not prevent normal BIND operation and will prevent exploitation of all known BIND security vulnerabilities . See the selinux(8) man page
       for information about SElinux.

It is not necessary to run named in a chroot environment if the Red Hat SELinux policy for named is enabled. When enabled, this policy is far more secure than a chroot environment. Users are recommended to enable
       SELinux and remove the bind-chroot package.

       With this extra security comes some restrictions:

By default, the SELinux policy does not allow named to write any master
       zone database files. Only the root user may create files in the
       $ROOTDIR/var/named zone database file directory (the options {
"directory" } option), where $ROOTDIR is set in /etc/sysconfig/named.

       The "named" group must be granted read privelege to these files in
       order for named to be enabled to read them.

Any file created in the zone database file directory is automatically
       assigned the SELinux file context named_zone_t .

       By default, SELinux prevents any role from modifying named_zone_t
files; this means that files in the zone database directory cannot be
       modified by dynamic DNS (DDNS) updates or zone transfers.

       The Red Hat BIND distribution and SELinux policy creates three
       directories where named is allowed to create and modify files:
/var/named/slaves, /var/named/dynamic /var/named/data. By placing files you want named to modify, such as slave or DDNS updateable zone files and database / statistics dump files in these directories, named will
       work normally and no further operator action is required. Files in
these directories are automatically assigned the ’named_cache_t’ file
       context, which SELinux allows named to write."


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux