Re: Modified a zone, so when it becomes available?

2009-09-16 Thread Frank Stanek
Robert Spangler schrieb:
> On Tuesday 15 September 2009 08:16, Frank Stanek wrote:
> 
>>  Please forgive my naivety if this is totally wrong but
>>  I don't have a chrooted bind environment to verify this atm.
> 
> I run a chroot environment
> 
>>  But doesn't the init script in some distributions copy the
>>  configuration files (including zone files) into the chroot
>>  joil because bind cannot access them in /etc from there?
> 
> Not that I am aware of.  If you know of a distro that does this let us know.  
>  
> A chroot'ed bind has no knowledge of anything outside of it's chroot 
> environment so the files have to exist there.
> 
>>  That could explain why it works when you use the init script
>>  to restart bind but it doesn't when you do rndc reload -
>>  the modified files don't get copied into the jail with
>>  rndc reload.
> 
> And they do not with the init script either.  The init script is shutting 
> down 
> bind and then reloading it again which forces a fresh read of all the files, 
> as rndc is just telling bind to re-read the zone.
> 
> 

You are correct. I just had a chance to look at
/etc/sysconfig/named in a SLES 10 installation and
it says this:

# Shall the DNS server 'named' or the LightWeight RESolver Daemon,
lwresd run
# in the chroot jail /var/lib/named/?
# Each time you start one of the daemons with the init script,
/etc/named.conf,
# /etc/named.conf.include, /etc/rndc.key, and all files listed in
# NAMED_CONF_INCLUDE_FILES will be copied relative to /var/lib/named/.

So the configuration and key files do get copied into the
chroot jail. But the zone files on SLES 10 already reside in
/var/lib/named, so that could not have been the problem.

Apologies and kind regards
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Modified a zone, so when it becomes available?

2009-09-16 Thread Marcos Lorenzo de Santiago
El mar, 15-09-2009 a las 13:45 +0200, Udo Zumdick escribió:
> Am Tue, 15 Sep 2009 12:28:24 +0200
> schrieb Marcos Lorenzo de Santiago :
> 
> []
> > After making changes to zone, updated serial, and rndc reload, I dig my
> > zone and get always the old serial. The serial and the changes only
> > appear when I '/etc/init.d/bind restart' it.
> > 
> > I use bind 9.5.1 on debian 5.0.3.
> > 
> > Any clue?
> 
> Maybe there are some .jnl files (IXFR journalfiles) which could prevent 
> bind from updating the zone ?
> Removing them and disabling incremental zone transfer might help. I had
> such problems in the past.

There are no .jnl files, so I guess is turned off, but anyway, how can I
know If this is enabled? I don't have any allow-update option...

Thanks in advance.

> 
> Udo
> 
> 
> 
>  _|_|_|_|_|_|  Udo Zumdick
>  ___  _|   _   Deutsche Telekom Netzproduktion GmbH
> |_|  |_|  |_| _|  |_|  Hammer Str. 216 - 226; 48153 Muenster
>   _|   mailto:u...@nic.dtag.de
>   _|   phone: +49 251 7985311; fax: +49 251 7985109
> 
> ___
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users
> 

-- 
,---.
| "Open Standards, Open Documents, and Open Source" |
|   -- Scott Bradner (Open Sources, 1999 O'Reilly and Associates)   |
|---|
| Técnico de Sistemas|  |
| Departamento de Informática| Debian GNU/Linux Powerer |
| Ayuntamiento de Getafe |.--.  |
||   |o_o | |
|  _ |  .''`.|:_/ | |
| |~~  @| Marcos Lorenzo de Santiago | : :' :   //   \ \|
| |     | marcos.lore...@ayto-getafe.org | `. `'   (| | )   |
| |_| Teléfono: (+34) 91-202-79-48   |   `-   /'\_   _/`\   |
| Móvil:(+34)  608-300-935   |\___)=(___/   |
||  |
`---'

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Need help on delegation to subdomain/external servers

2009-09-16 Thread RUOFF LARS
Hi,

i'm using BIND9 on an Ubuntu-8.10-server.
I'd like to configure the following:
For a given name (eg. vega.lab.ts), I'd like to forward the request to
two external DNS servers, *simultaneously*, and respond with the first
response that i get.

Is this possible?
I didn't see how to do it directly, so i tried using a subdomain, (eg.
x.vega.lab.ts) and specifiying the two DNS for this subdomain:

Extract from the lab.ts zone file:
[...]
x.lab.ts.   IN  NS  vega-a.x.lab.ts.
x.lab.ts.   IN  NS  vega-b.x.lab.ts.
vega-a.x.lab.ts.IN  A   172.25.32.252
vega-b.x.lab.ts.IN  A   192.168.2.3
[...]

But this doesnt seem to work:
named-checkzone lab.ts /etc/bind/db.lab.ts says:
zone lab.ts/IN: x.lab.ts/NS 'vega-a.x.lab.ts' (out of zone) has no
addresses records (A or ) zone lab.ts/IN: x.lab.ts/NS
'vega-b.x.lab.ts' (out of zone) has no addresses records (A or )
zone lab.ts/IN: loaded serial 2 OK

How can i do it?
Thanks,
Lars
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Need help on delegation to subdomain/external servers

2009-09-16 Thread Adam Tkac
On Wed, Sep 16, 2009 at 05:20:21PM +0200, RUOFF LARS wrote:
> Hi,
> 
> i'm using BIND9 on an Ubuntu-8.10-server.
> I'd like to configure the following:
> For a given name (eg. vega.lab.ts), I'd like to forward the request to
> two external DNS servers, *simultaneously*, and respond with the first
> response that i get.
> 
> Is this possible?
> I didn't see how to do it directly, so i tried using a subdomain, (eg.
> x.vega.lab.ts) and specifiying the two DNS for this subdomain:
> 
> Extract from the lab.ts zone file:
> [...]
> x.lab.ts.   IN  NS  vega-a.x.lab.ts.
> x.lab.ts.   IN  NS  vega-b.x.lab.ts.
> vega-a.x.lab.ts.IN  A   172.25.32.252
> vega-b.x.lab.ts.IN  A   192.168.2.3
> [...]
> 
> But this doesnt seem to work:
> named-checkzone lab.ts /etc/bind/db.lab.ts says:
> zone lab.ts/IN: x.lab.ts/NS 'vega-a.x.lab.ts' (out of zone) has no
> addresses records (A or ) zone lab.ts/IN: x.lab.ts/NS
> 'vega-b.x.lab.ts' (out of zone) has no addresses records (A or )
> zone lab.ts/IN: loaded serial 2 OK
> 
> How can i do it?
> Thanks,
> Lars

You can use `forward` zone. Check
https://www.isc.org/software/bind/documentation/arm95#zone_statement_grammar:

zone "example.com" IN {
type forward;
forward only;
forwarders { IPaddr; };
};

Regards, Adam

-- 
Adam Tkac, Red Hat, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Modified a zone, so when it becomes available?

2009-09-16 Thread Sam Wilson
In article ,
 Marcos Lorenzo de Santiago  wrote:

> El mar, 15-09-2009 a las 13:45 +0200, Udo Zumdick escribió:
> > Am Tue, 15 Sep 2009 12:28:24 +0200
> > schrieb Marcos Lorenzo de Santiago :
> > 
> > []
> > > After making changes to zone, updated serial, and rndc reload, I dig my
> > > zone and get always the old serial. The serial and the changes only
> > > appear when I '/etc/init.d/bind restart' it.
> > > 
> > > I use bind 9.5.1 on debian 5.0.3.
> > > 
> > > Any clue?
> > 
> > Maybe there are some .jnl files (IXFR journalfiles) which could prevent 
> > bind from updating the zone ?
> > Removing them and disabling incremental zone transfer might help. I had
> > such problems in the past.
> 
> There are no .jnl files, so I guess is turned off, but anyway, how can I
> know If this is enabled? I don't have any allow-update option...
> 
> Thanks in advance.

Have you checked your log file yet?  I don't know where the debian setup 
puts the messages by default, but you should be able to see messages 
saying what named is doing when you tell it to reload the zone.

Sam
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

9.7.0a3: dnssec-signzone signs with passive keys?

2009-09-16 Thread Hauke Lampe


I currently explore the new DNSKEY metadata and dnssec-signzone -S with
BIND 9.7.0a3. This feature definitely helps making key management easier
and will motivate more operators to sign their zones. Thank you for that.


For this test, I created a zone with one manually timed KSK, one active
ZSK and another published ZSK with an activation date in the future.

When I sign the zone from an unsigned zone file, dnssec-signzone works
as expected and signs the records only with the active ZSK.

Re-signing the signed zone file, however, also includes signatures from
the passive ZSK, *unless* I remove the DNSKEY records from the zone file
before signing. I guess this is due to the keys already in the signed
zone file overriding the -S switch:

|key
|Specify which keys should be used to sign the zone.
|If no keys are specified, then the zone will be examined for
|DNSKEY records at the zone apex. If these are found and
|there are matching private keys, in the current directory,
|then these will be used for signing.

(No "Fetching [...] from key repository" when re-signing)


My question is: Is this the supposed behaviour (ie. keys already
included in a zone don't have their metadata checked, so I would need to
remove DNSKEY records), did I miss an option to pass to dnssec-signzone
or is it likely to change for the next release?



Hauke.


dnssec-settime/signzone output:

KSK:

| Kkeyroll.dnstest.hauke-lampe.de.+005+07849.key
|
| Created: Wed Sep 16 04:23:39 2009
| Publish: UNSET
| Activate: UNSET
| Revoke: UNSET
| Unpublish: UNSET
| Delete: UNSET

Active ZSK:

| Kkeyroll.dnstest.hauke-lampe.de.+005+42630.key
|
| Created: Wed Sep 16 21:19:34 2009
| Publish: Wed Sep 16 21:19:34 2009
| Activate: Wed Sep 16 21:19:52 2009
| Delete: Tue Oct 13 21:19:34 2009

Passive ZSK:

| Kkeyroll.dnstest.hauke-lampe.de.+005+07701.key
|
| Created: Wed Sep 16 21:21:35 2009
| Publish: Wed Sep 16 21:21:35 2009
| Activate: Tue Sep 29 21:21:35 2009
| Delete: Tue Oct 13 21:21:35 2009

Signing the zone from an unsigned zone file:

| + dnssec-signzone -v 3 -N unixtime -K rollkeys -e +4d -i 172800 -S -T
230042 -o keyroll.dnstest.hauke-lampe.de -f db.keyroll.signed db.keyroll
| Fetching KSK 7849/RSASHA1 from key repository
| Fetching ZSK 42630/RSASHA1 from key repository
| Fetching ZSK 7701/RSASHA1 from key repository
| dnssec-signzone: debug 1: decrement_reference: delete from rbt:
0xb7c83060 keyroll.dnstest.hauke-lampe.de
| dnssec-signzone: debug 1: calling free_rbtdb(.)
| dnssec-signzone: debug 1: done free_rbtdb(.)
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/NSEC:
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/DNSKEY:
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/7849
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/SOA:
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/NS:
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630
| Verifying the zone using the following algorithms: RSASHA1.
| Zone signing complete:
| Algorithm: RSASHA1: ZSKs: 2, KSKs: 1 active, 0 revoked, 0 stand-by
| db.keyroll.signed
| dnssec-signzone: debug 1: calling
free_rbtdb(keyroll.dnstest.hauke-lampe.de)
| dnssec-signzone: debug 1: done free_rbtdb(keyroll.dnstest.hauke-lampe.de)

Re-Signing:

| + dnssec-signzone -v 3 -N unixtime -K rollkeys -e +4d -i 172800 -S -T
230042 -o keyroll.dnstest.hauke-lampe.de -f db.keyroll.signed
db.keyroll.signed
| dnssec-signzone: debug 1: decrement_reference: delete from rbt:
0xb7c91060 keyroll.dnstest.hauke-lampe.de
| dnssec-signzone: debug 1: calling free_rbtdb(.)
| dnssec-signzone: debug 1: done free_rbtdb(.)
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/SOA:
| dnssec-signzone:rrsig by
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630 dropped - failed to verify
| dnssec-signzone:resigning with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/7701
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/NS:
| dnssec-signzone:rrsig by
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630 retained
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/7701
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/NSEC:
| dnssec-signzone:rrsig by
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630 retained
| dnssec-signzone:signing with dnskey
keyroll.dnstest.hauke-lampe.de/RSASHA1/7701
| dnssec-signzone: keyroll.dnstest.hauke-lampe.de/DNSKEY:
| dnssec-signzone:rrsig by
keyroll.dnstest.hauke-lampe.de/RSASHA1/7849 retained
| dnssec-signzone:rrsig by
keyroll.dnstest.hauke-lampe.de/RSASHA1/42630 retained

Re: is TSIG key rollover possible?

2009-09-16 Thread Sebastian Castro
Mark Elkins wrote:
> Don't think TSIG Key roll-over is possible - in the DNSSEC sense. Don't
> think it is as necessary either. I have separate TSIG relationships
> between my Primary and Secondary peers. I use the same TSIG for all
> zones that are on both peers - the TSIG is to secure the path between
> the two peers. I also have 'ssh' access to the peers and in order to
> perform a 'roll-over' would be logged in (ssh) to both sides of a single
> pair of peers when doing the update. The job thus would be..
> 
> a) change the config files on both sides
> b) signal named to reread its config - on both sided
> 
> In total - I directly look after just eight such pairs of peers - not
> that hard. I change the signatures every 9 months.

Thanks for sharing your experience. In my particular case, I 'own' part
of the set of nameservers for my zones and the rest is provided by
external DNS providers. When you have full control of your machines, you
can prepare this change without issues: you change the keys, check the
conf files, push the new files and reload everything. But when you have
third parties involved in different time zones, is more complicated to
coordinate a time to do the same task.

I will investigate more based on Mark Andrews' reply and let the list know.

cheers
Sebastian Castro

> 
> The only Gotcha to changing from hmac-md5 to one of the other algorithms
> is that when checking AXFR's with 'dig'  you now need to add a third
> argument to the '-y' option - the algorithm to use. [-y [hmac:]name:key]
> 
> In real life - I run an ISP and offer paid for 'secondary' nameserver
> services to my clients (ie those with their own hosted servers). I thus
> dress all this up with Web pages and a database backend. TSIG is a free
> option - all made nice'n'easy ("change your named.conf to look like
> this..." cut-n-paste) even with e-mail reminders to change old
> signatures. Almost no one uses the TSIG option - no one seems very
> interested. (Hey mark - that's a very cool feature - I'll see if I have
> the time to get around to it one day)
> 
> On Wed, 2009-09-16 at 17:08 +1200, Sebastian Castro wrote:
>> Hi everyone:
>>
>> I was reading the document "Deprecation of HMAC-MD5 in DNS TSIG and TKEY
>> Resource Records"
>> (http://www.ietf.org/id/draft-ietf-dnsext-tsig-md5-deprecated-03.txt)
>> and I thought "Darn, I must be prepared to do a TSIG renovation", so
>> started researching how to do it.
>>
>> First step was checking if BIND supported a different algorithm, but the
>> BIND ARM for BIND9.5 and 9.6 indicates "The algorithm, hmac-md5, is the
>> only one supported by BIND". That seemed strange, considering the
>> document indicated above was originally proposed in 2008. So I "used the
>> source" and found out other algorithms are supported in 9.5 and 9.6, so
>> there is a mistake in the documentation.
>>
>> Anyway, TSIG rollover is an operation needed as indicated on RFC 2385:
>>
>>  RFC 2385 quote -
>> 6.2. Secret keys should be changed periodically.  If the client host
>>has been compromised, the server should suspend the use of all
>>secrets known to that client.  If possible, secrets should be stored
>>in encrypted form.  Secrets should never be transmitted in the clear
>>over any network.  This document does not address the issue on how to
>>distribute secrets. Secrets should never be shared by more than two
>>entities.
>>  RFC 2385 quote -
>>
>> but again the documentation indicates: "Multiple keys may be present,
>> but only the first is used."
>>
>> So, to coordinate the retirement of an old TSIG key and the introduction
>> of a new one, it seems a close coordination between peers is needed in
>> order to make it work, within a 'maintenance window' where the
>> operations using the TSIG are not executed (in my particular interest,
>> zone transfers)? Is it not possible to gradually introduce a new key,
>> use both for a period of time and later retire the old one, similar to
>> what is done in DNSSEC?
>>
>> Any experience on this matter that could be shared publicly or privately
>> will be appreciated.
>>
>> Kind Regards
>> Sebastian Castro
>> ___
>> bind-users mailing list
>> bind-users@lists.isc.org
>> https://lists.isc.org/mailman/listinfo/bind-users

___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: 9.7.0a3: dnssec-signzone signs with passive keys?

2009-09-16 Thread Evan Hunt
> Re-signing the signed zone file, however, also includes signatures from
> the passive ZSK, *unless* I remove the DNSKEY records from the zone file
> before signing. I guess this is due to the keys already in the signed
> zone file overriding the -S switch:

Yes, that's a bug.  Thank you very much, we'll address it in the next
release.

--
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Modified a zone, so when it becomes available?

2009-09-16 Thread Robert Spangler
On Wednesday 16 September 2009 02:52, Marcos Lorenzo de Santiago wrote:

>  El mar, 15-09-2009 a las 17:27 -0400, Robert Spangler escribió:
>  > On Tuesday 15 September 2009 08:16, Frank Stanek wrote:
>  > >  Please forgive my naivety if this is totally wrong but
>  > >  I don't have a chrooted bind environment to verify this atm.
>  >
>  > I run a chroot environment
>  >
>  > >  But doesn't the init script in some distributions copy the
>  > >  configuration files (including zone files) into the chroot
>  > >  joil because bind cannot access them in /etc from there?
>  >
>  > Not that I am aware of.  If you know of a distro that does this let us
>  > know. A chroot'ed bind has no knowledge of anything outside of it's
>  > chroot environment so the files have to exist there.
>
>  I just link the chrooted file named.conf to /etc/bind/named.conf, so the
>  file in /etc is actually a link to the file within then chrooted
>  environment.

In my environment I have the other way.  named.conf, named.zones and rndc.key 
in /etc are linked to the chroot enviroment.


-- 

Regards
Robert

Linux User #296285
http://counter.li.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Re: Need help on delegation to subdomain/external servers

2009-09-16 Thread Kevin Darcy

RUOFF LARS wrote:

Hi,

i'm using BIND9 on an Ubuntu-8.10-server.
I'd like to configure the following:
For a given name (eg. vega.lab.ts), I'd like to forward the request to
two external DNS servers, *simultaneously*, and respond with the first
response that i get.

Is this possible?
  

Short answer: not possible with BIND currently, that I know of.

Longer answer: why would you even want to do this? Sounds like you're 
barking up the wrong tree. Latency of DNS response may have little or 
nothing to do with the latency of whatever real-time connection (HTTP, 
LDAP, VoIP, video, audio, whatever) is being established using that DNS 
information. Trying to equate DNS response latency to anything else that 
a user would care about, is an exercise in futility, IMO.


Furthermore, have you considered caching? Once the answer is cached, 
then a BIND nameserver won't try to fetch the information from other 
servers *at*all*, until that cache entry expires.


If your goal is to optimize application performance by always directing 
users to a "best" node, among a set or cluster of nodes, then put a 
load-balancer in front of this resource: on the back-end, it can measure 
latency or any other metric(s), which is most representative of the 
"user experience" for this resource (depending on the 
probing/measurement capabilities of the load-balancer 
device/package/subsystem). On the front-end, the load-balancer responds 
with whatever IP represents the "best" choice for that resource, at any 
particular point in time. As with any DNS-based load-balancing scheme, 
you might have to lower the TTLs of the relevant records to 
ridiculously- (possibly anti-socially-)low values in order to provide 
sufficiently-dynamic load balancing.



I didn't see how to do it directly, so i tried using a subdomain, (eg.
x.vega.lab.ts) and specifiying the two DNS for this subdomain:

Extract from the lab.ts zone file:
[...]
x.lab.ts.   IN  NS  vega-a.x.lab.ts.
x.lab.ts.   IN  NS  vega-b.x.lab.ts.
vega-a.x.lab.ts.IN  A   172.25.32.252
vega-b.x.lab.ts.IN  A   192.168.2.3
[...]

But this doesnt seem to work:
named-checkzone lab.ts /etc/bind/db.lab.ts says:
zone lab.ts/IN: x.lab.ts/NS 'vega-a.x.lab.ts' (out of zone) has no
addresses records (A or ) zone lab.ts/IN: x.lab.ts/NS
'vega-b.x.lab.ts' (out of zone) has no addresses records (A or )
zone lab.ts/IN: loaded serial 2 OK
  
I just ran a quick test, and it appears that named-checkzone actually 
goes out and tries to resolve glue records it encounters. Since you 
haven't delegated the zone yet, it's not surprising that the glue 
records don't resolve from the authoritative nameservers for the zone. 
In this respect, I think named-checkzone is being more rigorous than 
named itself would be, as it loads the zone. If these "no addresses 
records [sic]" errors are the *only* ones being reported for the zone, 
then I'd try to load it and see if those errors magically evaporate once 
you do that.


I don't think delegation is the solution to your load-balancing 
requirement, however. NS'es are tried, sequentially, according to 
historical RTT statistics; _over_time_, faster-responding servers will 
tend to get tried before slow-responding ones, but this adaptivity may 
take time to kick in when the responsiveness of the target nameservers 
changes, so it would probably not be dynamic enough to meet your 
requirements, even _if_ the latency of DNS responses were reflective of 
the performance of the underlying app (which I question above).


- Kevin


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Modified a zone, so when it becomes available?

2009-09-16 Thread Barry Margolin
In article ,
 Robert Spangler  wrote:

> On Wednesday 16 September 2009 02:52, Marcos Lorenzo de Santiago wrote:
> 
> >  El mar, 15-09-2009 a las 17:27 -0400, Robert Spangler escribió:
> >  > On Tuesday 15 September 2009 08:16, Frank Stanek wrote:
> >  > >  Please forgive my naivety if this is totally wrong but
> >  > >  I don't have a chrooted bind environment to verify this atm.
> >  >
> >  > I run a chroot environment
> >  >
> >  > >  But doesn't the init script in some distributions copy the
> >  > >  configuration files (including zone files) into the chroot
> >  > >  joil because bind cannot access them in /etc from there?
> >  >
> >  > Not that I am aware of.  If you know of a distro that does this let us
> >  > know. A chroot'ed bind has no knowledge of anything outside of it's
> >  > chroot environment so the files have to exist there.
> >
> >  I just link the chrooted file named.conf to /etc/bind/named.conf, so the
> >  file in /etc is actually a link to the file within then chrooted
> >  environment.
> 
> In my environment I have the other way.  named.conf, named.zones and rndc.key 
> in /etc are linked to the chroot enviroment.

If you're talking about hard links, there is no directionality.  All 
hard links are equivalent pointers to the same inode.

Symbolic links, on the other hand, are pointers from one filename to 
another.  A symbolic link in a chroot environment can't point outside of 
it, because the target is interpreted relative to the chroot.

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users