Named updating zone log Free sex chats with no upgrades and subscriptions

/root/zones/, do: # chcon system_u:object_r:named_zone_t /root/zones/ See these man-pages for more information : selinux(8), named_selinux(8), chcon(1), setsebool(8) For assistance with problems and questions for which you have not been able to find an answer in our Knowledge Base, we recommend searching our community mailing list archives and/or posting your question there (you will need to register there first for your posts to be accepted).

The bind-users and the dhcp-users lists particularly have a long-standing and active membership.

I'm baffled for the exact reason it's working, but I'll take it! EDIT: It looks as if my reverse zone file got updated somehow (I'm assuming via nsupdate). Note the difference from my originally posted in my original question.

It recreated it properly (though with 644 permissions), and it worked from there on out. ( 4 ; serial 604800 ; refresh (1 week) 86400 ; retry (1 day) 2419200 ; expire (4 weeks) 604800 ; minimum (1 week) ) NS ns1.

Specifically problems are encountered with updating slave zone database files, creating DDNS journal files and updating master zones from journals.

It also manifests itself as named being unable to create custom log files.

I mean, I checked the dang permissions at least a dozen times.

To add security and allow updates only for those who actually are permitted, a smart move is to go TSIG.

It is described in RFC 2845 Secret Key Transaction Authentication for DNS (TSIG) and is supported by many DNS-servers, including BIND. Best description I found is in Jeff Garzik's blog the article is title "nsupdate: Painless Dynamic DNS".

Most servers simply don't allow dynamic updates and those who do, don't allow it for all zones.

Security-wise one of the simplest approaches is to allow updating a zone from specific subnet or hand-picked IP-addresses.

Leave a Reply