diff options
author | dougb <dougb@FreeBSD.org> | 2010-03-03 05:45:24 +0000 |
---|---|---|
committer | dougb <dougb@FreeBSD.org> | 2010-03-03 05:45:24 +0000 |
commit | c52afe031a68f8430df41e7ab57296c1daefff9b (patch) | |
tree | 62d02001f69506ed0ec63ea339614e3658d10ebf /contrib/bind9/FAQ | |
parent | e901048f7a904e924f01096cc6dd1e754aba05a5 (diff) | |
download | FreeBSD-src-c52afe031a68f8430df41e7ab57296c1daefff9b.zip FreeBSD-src-c52afe031a68f8430df41e7ab57296c1daefff9b.tar.gz |
Upgrade to version 9.6.2. This version includes all previously released
security patches to the 9.6.1 version, as well as many other bug fixes.
This version also incorporates a different fix for the problem we had
patched in contrib/bind9/bin/dig/dighost.c, so that file is now back
to being the same as the vendor version.
Due to the fact that the DNSSEC algorithm that will be used to sign the
root zone is only included in this version and in 9.7.x those who wish
to do validation MUST upgrade to one of these prior to July 2010.
Diffstat (limited to 'contrib/bind9/FAQ')
-rw-r--r-- | contrib/bind9/FAQ | 18 |
1 files changed, 17 insertions, 1 deletions
diff --git a/contrib/bind9/FAQ b/contrib/bind9/FAQ index b256ed8..9e3469c 100644 --- a/contrib/bind9/FAQ +++ b/contrib/bind9/FAQ @@ -1,6 +1,6 @@ Frequently Asked Questions about BIND 9 -Copyright © 2004-2009 Internet Systems Consortium, Inc. ("ISC") +Copyright © 2004-2010 Internet Systems Consortium, Inc. ("ISC") Copyright © 2000-2003 Internet Software Consortium. @@ -784,6 +784,22 @@ A: Red Hat Security Enhanced Linux (SELinux) policy security protections : See these man-pages for more information : selinux(8), named_selinux (8), chcon(1), setsebool(8) +Q: I'm running BIND on Ubuntu - + + Why can't named update slave zone database files? + + Why can't named create DDNS journal files or update the master zones + from journals? + + Why can't named create custom log files? + +A: Ubuntu uses AppArmor <http://en.wikipedia.org/wiki/AppArmor> in + addition to normal file system permissions to protect the system. + + Adjust the paths to use those specified in /etc/apparmor.d/ + usr.sbin.named or adjust /etc/apparmor.d/usr.sbin.named to allow named + to write at the location specified in named.conf. + Q: Listening on individual IPv6 interfaces does not work. A: This is usually due to "/proc/net/if_inet6" not being available in the |