1 | # Additional informations for DNS setup using BIND
|
---|
2 |
|
---|
3 | # If you are running a capable version of BIND and you wish to support secure
|
---|
4 | # GSS-TSIG updates, you must make the following configuration changes:
|
---|
5 |
|
---|
6 | # - Insert the following lines into the options {} section of your named.conf
|
---|
7 | # file:
|
---|
8 | tkey-gssapi-credential "DNS/${DNSDOMAIN}";
|
---|
9 | tkey-domain "${REALM}";
|
---|
10 |
|
---|
11 | # - Modify BIND init scripts to pass the location of the generated keytab file.
|
---|
12 | # Fedora 8 & later provide a variable named KEYTAB_FILE in /etc/sysconfig/named
|
---|
13 | # for this purpose:
|
---|
14 | KEYTAB_FILE="${DNS_KEYTAB_ABS}"
|
---|
15 | # Note that the Fedora scripts translate KEYTAB_FILE behind the scenes into a
|
---|
16 | # variable named KRB5_KTNAME, which is ultimately passed to the BIND daemon. If
|
---|
17 | # your distribution does not provide a variable like KEYTAB_FILE to pass a
|
---|
18 | # keytab file to the BIND daemon, a workaround is to place the following line in
|
---|
19 | # BIND's sysconfig file or in the init script for BIND:
|
---|
20 | export KRB5_KTNAME="${DNS_KEYTAB_ABS}"
|
---|
21 |
|
---|
22 | # - Set appropriate ownership and permissions on the ${DNS_KEYTAB} file. Note
|
---|
23 | # that most distributions have BIND configured to run under a non-root user
|
---|
24 | # account. For example, Fedora 9 runs BIND as the user "named" once the daemon
|
---|
25 | # relinquishes its rights. Therefore, the file ${DNS_KEYTAB} must be readable
|
---|
26 | # by the user that BIND run as. If BIND is running as a non-root user, the
|
---|
27 | # "${DNS_KEYTAB}" file must have its permissions altered to allow the daemon to
|
---|
28 | # read it. Under Fedora 9, execute the following commands:
|
---|
29 | chgrp named ${DNS_KEYTAB_ABS}
|
---|
30 | chmod g+r ${DNS_KEYTAB_ABS}
|
---|
31 |
|
---|
32 | # - Ensure the BIND zone file(s) that will be dynamically updated are in a
|
---|
33 | # directory where the BIND daemon can write. When BIND performs dynamic
|
---|
34 | # updates, it not only needs to update the zone file itself but it must also
|
---|
35 | # create a journal (.jnl) file to track the dynamic updates as they occur.
|
---|
36 | # Under Fedora 9, the /var/named directory can not be written to by the "named"
|
---|
37 | # user. However, the directory /var/named/dynamic directory does provide write
|
---|
38 | # access. Therefore the zone files were placed under the /var/named/dynamic
|
---|
39 | # directory. The file directives in both example zone statements at the
|
---|
40 | # beginning of this file were changed by prepending the directory "dynamic/".
|
---|
41 |
|
---|
42 | # - If SELinux is enabled, ensure that all files have the appropriate SELinux
|
---|
43 | # file contexts. The ${DNS_KEYTAB} file must be accessible by the BIND daemon
|
---|
44 | # and should have a SELinux type of named_conf_t. This can be set with the
|
---|
45 | # following command:
|
---|
46 | chcon -t named_conf_t ${DNS_KEYTAB_ABS}
|
---|