> On Feb 22, 2016, at 3:14 AM, Reco <recovery...@gmail.com> wrote: > > Please post the output of: > > ls -ald /var/cache/bind/slaves
drwxrwxr-x 2 bind bind 4096 Feb 5 07:52 /var/cache/bind/slaves > lsattr /var/cache/bind/slaves -------------e-- /var/cache/bind/slaves/db.172.16.0 -------------e-- /var/cache/bind/slaves/db.richeyrentals.com -------------e-- /var/cache/bind/slaves/db.richeyrentals.dmz -------------e-- /var/cache/bind/slaves/db.richeyrentals.lan > getfacl /var/cache/bind/slaves getfacl: Removing leading '/' from absolute path names # file: var/cache/bind/slaves # owner: bind # group: bind user::rwx group::rwx other::r-x > Also, do you have SELinux enabled? root@log:/etc# egrep -ir SELinux * dbus-1/session.conf: <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> dbus-1/system.conf: <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> init.d/x11-common: # Restore file security context (SELinux). init.d/udev: # set the SELinux context for devices created in the initramfs init.d/checkroot.sh: if selinux_enabled && [ -x /sbin/restorecon ] && [ -r /etc/mtab ] Binary file ld.so.cache matches pam.d/login:# SELinux needs to be the first session rule. This ensures that any pam.d/login:# When the module is present, "required" would be sufficient (When SELinux pam.d/login:session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close pam.d/login:# SELinux needs to intervene at login time to ensure that the process pam.d/login:session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open pam.d/login:# When the module is present, "required" would be sufficient (When SELinux pam.d/sshd:# Set up SELinux capabilities (need modified pam) pam.d/sshd:# session required pam_selinux.so multiple security/sepermit.conf:# - a SELinux user name, with %seuser syntax selinux/semanage.conf:# Specify how libsemanage will interact with a SELinux policy manager. selinux/semanage.conf:# "source" - libsemanage manipulates a source SELinux policy webmin/useradmin/config:selinux_con=user_u:object_r:user_home_dir_t I think so... -- Glenn English