source: trunk/server/source4/setup/named.txt@ 1036

Last change on this file since 1036 was 414, checked in by Herwig Bauernfeind, 16 years ago

Samba 3.5.0: Initial import

File size: 2.5 KB
Line 
1# Additional informations for DNS setup using BIND
2
3# If you are running a capable version of BIND and you wish to support secure
4# GSS-TSIG updates, you must make the following configuration changes:
5
6# - Insert the following lines into the options {} section of your named.conf
7# file:
8tkey-gssapi-credential "DNS/${DNSDOMAIN}";
9tkey-domain "${REALM}";
10
11# - Modify BIND init scripts to pass the location of the generated keytab file.
12# Fedora 8 & later provide a variable named KEYTAB_FILE in /etc/sysconfig/named
13# for this purpose:
14KEYTAB_FILE="${DNS_KEYTAB_ABS}"
15# Note that the Fedora scripts translate KEYTAB_FILE behind the scenes into a
16# variable named KRB5_KTNAME, which is ultimately passed to the BIND daemon. If
17# your distribution does not provide a variable like KEYTAB_FILE to pass a
18# keytab file to the BIND daemon, a workaround is to place the following line in
19# BIND's sysconfig file or in the init script for BIND:
20export KRB5_KTNAME="${DNS_KEYTAB_ABS}"
21
22# - Set appropriate ownership and permissions on the ${DNS_KEYTAB} file. Note
23# that most distributions have BIND configured to run under a non-root user
24# account. For example, Fedora 9 runs BIND as the user "named" once the daemon
25# relinquishes its rights. Therefore, the file ${DNS_KEYTAB} must be readable
26# by the user that BIND run as. If BIND is running as a non-root user, the
27# "${DNS_KEYTAB}" file must have its permissions altered to allow the daemon to
28# read it. Under Fedora 9, execute the following commands:
29chgrp named ${DNS_KEYTAB_ABS}
30chmod g+r ${DNS_KEYTAB_ABS}
31
32# - Ensure the BIND zone file(s) that will be dynamically updated are in a
33# directory where the BIND daemon can write. When BIND performs dynamic
34# updates, it not only needs to update the zone file itself but it must also
35# create a journal (.jnl) file to track the dynamic updates as they occur.
36# Under Fedora 9, the /var/named directory can not be written to by the "named"
37# user. However, the directory /var/named/dynamic directory does provide write
38# access. Therefore the zone files were placed under the /var/named/dynamic
39# directory. The file directives in both example zone statements at the
40# beginning of this file were changed by prepending the directory "dynamic/".
41
42# - If SELinux is enabled, ensure that all files have the appropriate SELinux
43# file contexts. The ${DNS_KEYTAB} file must be accessible by the BIND daemon
44# and should have a SELinux type of named_conf_t. This can be set with the
45# following command:
46chcon -t named_conf_t ${DNS_KEYTAB_ABS}
Note: See TracBrowser for help on using the repository browser.