| Securing and Optimizing Linux: RedHat Edition -A Hands on Guide | ||
|---|---|---|
| Prev | Chapter 21. Software -Networking | Next | 
Remove the unnecessary files and directory.
| [root@deep] /# rm -f /usr/sbin/named [root@deep] /# rm -f /usr/sbin/named-xfer [root@deep] /# rm -f /etc/named.conf [root@deep] /# rm -rf /var/named/ | 
We must test the new chrooted jail configuration of our ISC BIND/DNS software.
The first thing to do is to restart our syslogd daemon with the following command:
| [root@deep] /# /etc/rc.d/init.d/syslog restart | 
| Shutting down kernel logger: [ OK ] Shutting down system logger: [ OK ] Starting system logger: [ OK ] Starting kernel logger: [ OK ] | 
Now, start the new chrooted jail ISC BIND/DNS with the following command:
| [root@deep] /# /etc/rc.d/init.d/named start | 
| Starting named: [ OK ] | 
Make sure it's running as user named and with the new arguments. To verify that ISC BIND/DNS is running as user named with the new arguments, use the following command:
| [root@deep] /# ps auxw | grep named | 
| named 11446 0.0 1.2 2444 1580 ? S 23:09 0:00 /chroot/named/usr/sbin/named -t /chroot/named/ -unamed -gnamed | 
Please dont forget to cleanup:
| [root@deep] /# rm -rf /var/tmp/src bind-src.tar.gz | 
Further documentation, for more details there are several man pages you can read:
- show the system's DNS domain name
- generate public, private, and shared secret keys for DNS Security
- query domain name servers using resolver
- Internet domain name server DNS
- Hesiod name server interface library
- determine run-time link bindings
- specify key bindings for less
- bind a Linux raw character device
- make FIFOs named pipes
- convert name server configuration files
- ancillary agent for inbound zone transfers
- configuration file for
- Disable named opcodes when compiling perl code
- send domain name query packets to name servers
- query Internet name servers interactively
- name daemon control program