Ignore:
Timestamp:
09/29/2003 04:32:43 PM (21 years ago)
Author:
Larry Lawrence <larry@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
8eb94806
Parents:
31ff91e4
Message:

gdbm -> GDBM

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@1240 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • server/other/bind/bind-config.xml

    r31ff91e4 rca89a835  
    1414jail as an unprivileged user (named). This configuration is more secure
    1515in that a <acronym>DNS</acronym> compromise can only affect a few files
    16 in the named user's <envar>$HOME</envar> directory.</para>
     16in the named user's <envar>HOME</envar> directory.</para>
    1717
    1818<para>First we create the unpriviledged user and group named:</para>
     
    5858     file "pz/127.0.0";
    5959 };
    60 <command>>EOF</command></userinput></screen>
     60<command>EOF</command></userinput></screen>
    6161
    6262<para>Create a zone file with the following contents:</para>
     
    107107L.ROOT-SERVERS.NET.     6D  IN      A       198.32.64.12
    108108M.ROOT-SERVERS.NET.     6D  IN      A       202.12.27.33
    109 <command>>EOF</command></userinput></screen>
     109<command>EOF</command></userinput></screen>
    110110
    111111<para>The <filename>root.hints</filename> file is a list of root name
    112112servers. This file must be updated periodically with the
    113113<command>dig</command> utility.
    114 Consult the <acronym>BIND</acronym> 9 Administrator Reference Manual for
     114Consult the <application><acronym>BIND</acronym></application> 9 Administrator Reference Manual for
    115115details.</para>
    116116
     
    143143search yourdomain.com
    144144nameserver 127.0.0.1
    145 <command>>EOF</command></userinput></screen>
     145<command>EOF</command></userinput></screen>
    146146
    147147<para>Set permissions on the chroot jail with the following
Note: See TracChangeset for help on using the changeset viewer.