[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: BIND problem



> On Feb 22, 2016, at 3:14 AM, Reco <recoverym4n@gmail.com> wrote:
> 
> Please post the output of:
> 
> ls -ald /var/cache/bind/slaves

drwxrwxr-x 2 bind bind 4096 Feb  5 07:52 /var/cache/bind/slaves

> lsattr /var/cache/bind/slaves

-------------e-- /var/cache/bind/slaves/db.172.16.0
-------------e-- /var/cache/bind/slaves/db.richeyrentals.com
-------------e-- /var/cache/bind/slaves/db.richeyrentals.dmz
-------------e-- /var/cache/bind/slaves/db.richeyrentals.lan

> getfacl /var/cache/bind/slaves

getfacl: Removing leading '/' from absolute path names
# file: var/cache/bind/slaves
# owner: bind
# group: bind
user::rwx
group::rwx
other::r-x

> Also, do you have SELinux enabled?

root@log:/etc# egrep -ir SELinux *
dbus-1/session.conf:  <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include>
dbus-1/system.conf:  <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include>
init.d/x11-common:  # Restore file security context (SELinux).
init.d/udev:    # set the SELinux context for devices created in the initramfs
init.d/checkroot.sh:	if selinux_enabled && [ -x /sbin/restorecon ] && [ -r /etc/mtab ]
Binary file ld.so.cache matches
pam.d/login:# SELinux needs to be the first session rule. This ensures that any 
pam.d/login:# When the module is present, "required" would be sufficient (When SELinux
pam.d/login:session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close
pam.d/login:# SELinux needs to intervene at login time to ensure that the process
pam.d/login:session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open
pam.d/login:# When the module is present, "required" would be sufficient (When SELinux
pam.d/sshd:# Set up SELinux capabilities (need modified pam)
pam.d/sshd:# session  required     pam_selinux.so multiple
security/sepermit.conf:#        - a SELinux user name, with %seuser syntax
selinux/semanage.conf:# Specify how libsemanage will interact with a SELinux policy manager.
selinux/semanage.conf:#  "source"     - libsemanage manipulates a source SELinux policy
webmin/useradmin/config:selinux_con=user_u:object_r:user_home_dir_t

I think so...

-- 
Glenn English




Reply to: