NAMED(8) | BIND9 | NAMED(8) |
NAME¶
named - Internet domain name server
SYNOPSIS¶
named [-4] [-6] [-c config-file] [-d debug-level] [-E engine-name] [-f] [-g] [-m flag] [-n #cpus] [-p port] [-s] [-S #max-socks] [-t directory] [-u user] [-v] [-V] [-x cache-file]
DESCRIPTION¶
named is a Domain Name System (DNS) server, part of the BIND 9 distribution from ISC. For more information on the DNS, see RFCs 1033, 1034, and 1035.
When invoked without arguments, named will read the default configuration file /etc/named.conf, read any initial data, and listen for queries.
OPTIONS¶
-4
-6
-c config-file
-d debug-level
-E engine-name
-f
-g
-m flag
-n #cpus
-p port
-s
-S #max-socks
-t directory
-u user
-v
-V
-x cache-file
SIGNALS¶
In routine operation, signals should not be used to control the nameserver; rndc should be used instead.
SIGHUP
SIGINT, SIGTERM
The result of sending any other signals to the server is undefined.
CONFIGURATION¶
The named configuration file is too complex to describe in detail here. A complete description is provided in the BIND 9 Administrator Reference Manual.
named inherits the umask (file creation mode mask) from the parent process. If files created by named, such as journal files, need to have custom permissions, the umask should be set explicitly in the script used to start the named process.
FILES¶
/etc/named.conf
/var/run/named/named.pid
NOTES¶
By default, Red Hat ships BIND with the most secure SELinux policy that will not prevent normal BIND operation and will prevent exploitation of all known BIND security vulnerabilities . See the selinux(8) man page for information about SElinux.
It is not necessary to run named in a chroot environment if the Red Hat SELinux policy for named is enabled. When enabled, this policy is far more secure than a chroot environment. Users are recommended to enable SELinux and remove the bind-chroot package.
With this extra security comes some restrictions:
By default, the SELinux policy does not allow named to write any master zone database files. Only the root user may create files in the $ROOTDIR/var/named zone database file directory (the options { "directory" } option), where $ROOTDIR is set in /etc/sysconfig/named.
The "named" group must be granted read privelege to these files in order for named to be enabled to read them.
Any file created in the zone database file directory is automatically assigned the SELinux file context named_zone_t .
By default, SELinux prevents any role from modifying named_zone_t files; this means that files in the zone database directory cannot be modified by dynamic DNS (DDNS) updates or zone transfers.
The Red Hat BIND distribution and SELinux policy creates three directories where named is allowed to create and modify files: /var/named/slaves, /var/named/dynamic /var/named/data. By placing files you want named to modify, such as slave or DDNS updateable zone files and database / statistics dump files in these directories, named will work normally and no further operator action is required. Files in these directories are automatically assigned the 'named_cache_t' file context, which SELinux allows named to write.
Red Hat BIND SDB support:
Red Hat ships named with compiled in Simplified Database Backend modules that ISC provides in the "contrib/sdb" directory. Install bind-sdb package if you want use them
The SDB modules for LDAP, PostGreSQL, DirDB and SQLite are compiled into named-sdb.
See the documentation for the various SDB modules in
/usr/share/doc/bind-sdb-*/ .
SEE ALSO¶
RFC 1033, RFC 1034, RFC 1035, named-checkconf(8), named-checkzone(8), rndc(8), lwresd(8), named.conf(5), BIND 9 Administrator Reference Manual.
AUTHOR¶
Internet Systems Consortium
COPYRIGHT¶
Copyright © 2004-2009 Internet Systems Consortium, Inc.
("ISC")
Copyright © 2000, 2001, 2003 Internet Software Consortium.
May 21, 2009 | BIND9 |