Securing and Optimizing Linux: RedHat Edition -A Hands on Guide | ||
---|---|---|
Prev | Chapter 21. Software -Networking | Next |
Remove the unnecessary files and directory.
[root@deep] /# rm -f /usr/sbin/named [root@deep] /# rm -f /usr/sbin/named-xfer [root@deep] /# rm -f /etc/named.conf [root@deep] /# rm -rf /var/named/ |
We must test the new chrooted jail configuration of our ISC BIND/DNS software.
The first thing to do is to restart our syslogd daemon with the following command:
[root@deep] /# /etc/rc.d/init.d/syslog restart |
Shutting down kernel logger: [ OK ] Shutting down system logger: [ OK ] Starting system logger: [ OK ] Starting kernel logger: [ OK ] |
Now, start the new chrooted jail ISC BIND/DNS with the following command:
[root@deep] /# /etc/rc.d/init.d/named start |
Starting named: [ OK ] |
Make sure it's running as user named and with the new arguments. To verify that ISC BIND/DNS is running as user named with the new arguments, use the following command:
[root@deep] /# ps auxw | grep named |
named 11446 0.0 1.2 2444 1580 ? S 23:09 0:00 /chroot/named/usr/sbin/named -t /chroot/named/ -unamed -gnamed |
Please dont forget to cleanup:
[root@deep] /# rm -rf /var/tmp/src bind-src.tar.gz |
Further documentation, for more details there are several man pages you can read:
- show the system's DNS domain name
- generate public, private, and shared secret keys for DNS Security
- query domain name servers using resolver
- Internet domain name server DNS
- Hesiod name server interface library
- determine run-time link bindings
- specify key bindings for less
- bind a Linux raw character device
- make FIFOs named pipes
- convert name server configuration files
- ancillary agent for inbound zone transfers
- configuration file for
- Disable named opcodes when compiling perl code
- send domain name query packets to name servers
- query Internet name servers interactively
- name daemon control program