From 6e3ed3758f10ec3d8452202bcd5306a8a50cdbd9 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sun, 2 Sep 2007 23:29:48 +0200 Subject: r24910: Merge named.conf patch by Andrew Kroeger into release branch. Andrew Bartlett (This used to be commit 413af0aa02df1d0b8b3998253d4375364cc6899a) --- source4/setup/named.conf | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/source4/setup/named.conf b/source4/setup/named.conf index 2513632a47..6f97adf644 100644 --- a/source4/setup/named.conf +++ b/source4/setup/named.conf @@ -4,7 +4,7 @@ # #insert this into options {} -tkey-gssapi-credential "DNS/${DNSDOMAIN}" +tkey-gssapi-credential "DNS/${DNSDOMAIN}"; tkey-domain "${REALM}"; #the zone file @@ -19,9 +19,18 @@ zone "${DNSDOMAIN}." IN { }; # Also, you need to change your init scripts to set this environment variable -# for named: KRB_KTNAME so that it points to the keytab generated. +# for named: KRB5_KTNAME so that it points to the keytab generated. # In RedHat derived systems such RHEL/CentOS/Fedora you can add the following -# line to the /etc/sysconfig/named file -# export KRB_KTNAME=/etc/named.keytab - -# *TODO*: generate and install a keytab file in /etc/named.keytab +# line to the /etc/sysconfig/named file: +# export KRB5_KTNAME=${DNS_KEYTAB} +# +# Please note that most distributions have BIND configured to run under +# a non-root user account. For example, Fedora Core 6 (FC6) runs BIND as +# the user "named" once the daemon relinquishes its rights. Therefore, +# the file "dns.keytab" must be readable by the user that BIND run as. +# If BIND is running as a non-root user, the "dns.keytab" file must have its +# permissions altered to allow thge daemon to read it. In the FC6 +# example, execute the commands: +# +# chgrp named /usr/local/samba/private/dns.keytab +# chmod g+r /usr/local/samba/private/dns.keytab -- cgit