Skip to content
The extension for managing a remote slave DNS server via rndc protocol (bind).
PHP HTML
Branch: master
Clone or download
Latest commit a2530e8 Dec 19, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
_meta Update Icons (#28) Feb 2, 2018
htdocs Fix icons for the list Dec 16, 2019
plib Fix icons for the list Dec 16, 2019
var Initial draft of extension. Jul 29, 2013
CHANGES.md
DESCRIPTION.md Update DESCRIPTION.md Apr 3, 2017
LICENSE Update copyright year. Apr 10, 2017
README.md small fixes Mar 31, 2017
meta.xml Up version to 1.9.2 Dec 19, 2019

README.md

Slave DNS Manager

Apache 2

The extension for managing a remote slave DNS server via rndc protocol (bind).

The following techniques are demonstrated:

  • Integration with DNS subsystem.

Troubleshooting

CentOS 7

First of all, please read man named especially section NOTES. A few paragraphs from named manual:

By default, Red Hat ships BIND with the most secure SELinux policy that will not prevent normal BIND operation and will prevent exploitation of all known BIND security vulnerabilities . See the selinux(8) man page for information about SElinux.

It is not necessary to run named in a chroot environment if the Red Hat SELinux policy for named is enabled. When enabled, this policy is far more secure than a chroot environment. Users are recommended to enable SELinux and remove the bind-chroot package.

Enabled SELinux

  • By default, the SELinux policy does not allow named to write any master zone database files.

# setsebool -P named_write_master_zones 1

Disabled SELinux

  • Check group write privelege to /var/named, /var/named/chroot/var/named/

# chmod g+w /var/named /var/named/chroot/var/named

You can’t perform that action at this time.