2 # Insert these snippets into your named.conf or bind.conf to configure
6 #insert this into options {}
7 tkey-gssapi-credential "DNS/${DNSDOMAIN}";
8 tkey-domain "${REALM}";
11 zone "${DNSDOMAIN}." IN {
13 file "${DNSDOMAIN}.zone";
15 /* use ANY only for Domain controllers for now */
16 /* for normal machines A AAAA PTR is probbaly all is needed */
17 grant ${HOSTNAME}.${DNSDOMAIN}@${REALM} name ${HOSTNAME}.${DNSDOMAIN} ANY;
21 # Also, you need to change your init scripts to set this environment variable
22 # for named: KRB5_KTNAME so that it points to the keytab generated.
23 # In RedHat derived systems such RHEL/CentOS/Fedora you can add the following
24 # line to the /etc/sysconfig/named file:
25 # export KRB5_KTNAME=${DNS_KEYTAB}
27 # Please note that most distributions have BIND configured to run under
28 # a non-root user account. For example, Fedora Core 6 (FC6) runs BIND as
29 # the user "named" once the daemon relinquishes its rights. Therefore,
30 # the file "dns.keytab" must be readable by the user that BIND run as.
31 # If BIND is running as a non-root user, the "dns.keytab" file must have its
32 # permissions altered to allow thge daemon to read it. In the FC6
33 # example, execute the commands:
35 # chgrp named /usr/local/samba/private/dns.keytab
36 # chmod g+r /usr/local/samba/private/dns.keytab