No description
Find a file
2026-02-19 15:27:59 +02:00
_meta Update Icons (#28) 2018-02-02 14:35:14 +07:00
htdocs TECH fix left menu icon 2021-08-13 12:01:16 +07:00
plib Deprecation warnings fix 2025-10-29 09:42:25 +02:00
var Initial draft of extension. 2013-07-29 14:09:59 +07:00
CHANGES.md TECH Update CHANGES.md 2026-02-19 15:08:19 +02:00
DESCRIPTION.md Update DESCRIPTION.md 2017-04-03 13:15:15 +07:00
LICENSE Update copyright year. 2017-04-10 10:27:26 +07:00
meta.xml Deprecation warnings fix 2025-10-29 09:42:25 +02:00
README.md small fixes 2017-03-31 20:51:26 +07:00

Slave DNS Manager

Apache 2

The extension for managing a remote slave DNS server via rndc protocol (bind).

The following techniques are demonstrated:

  • Integration with DNS subsystem.

Troubleshooting

CentOS 7

First of all, please read man named especially section NOTES. A few paragraphs from named manual:

By default, Red Hat ships BIND with the most secure SELinux policy that will not prevent normal BIND operation and will prevent exploitation of all known BIND security vulnerabilities . See the selinux(8) man page for information about SElinux.

It is not necessary to run named in a chroot environment if the Red Hat SELinux policy for named is enabled. When enabled, this policy is far more secure than a chroot environment. Users are recommended to enable SELinux and remove the bind-chroot package.

Enabled SELinux

  • By default, the SELinux policy does not allow named to write any master zone database files.

# setsebool -P named_write_master_zones 1

Disabled SELinux

  • Check group write privelege to /var/named, /var/named/chroot/var/named/

# chmod g+w /var/named /var/named/chroot/var/named