Configure BIND LDAP driver to use SASL authentication

We use /etc/named.keytab generated by ipa-server-install to authenticate
against the LDAP server. Also tidy up /etc/named.conf since we're there.
This commit is contained in:
Martin Nagy 2009-06-09 14:59:11 +02:00 committed by Simo Sorce
parent 9fe707a3f2
commit 5149803873

View File

@ -1,24 +1,23 @@
options { options {
// Put files that named is allowed to write in the data/ directory: // Put files that named is allowed to write in the data/ directory:
directory "/var/named"; // the default directory "/var/named"; // the default
dump-file "data/cache_dump.db"; dump-file "data/cache_dump.db";
statistics-file "data/named_stats.txt"; statistics-file "data/named_stats.txt";
memstatistics-file "data/named_mem_stats.txt"; memstatistics-file "data/named_mem_stats.txt";
/* Not used yet, support only on very recent bind versions */ tkey-gssapi-credential "DNS/$FQDN";
# tkey-gssapi-credential "DNS/$FQDN"; tkey-domain "$REALM";
# tkey-domain "$REALM";
}; };
logging { /* If you want to enable debugging, eg. using the 'rndc trace' command,
/* If you want to enable debugging, eg. using the 'rndc trace' command, * By default, SELinux policy does not allow named to modify the /var/named directory,
* By default, SELinux policy does not allow named to modify the /var/named directory, * so put the default debug log file in data/ :
* so put the default debug log file in data/ :
*/ */
channel default_debug { logging {
file "data/named.run"; channel default_debug {
severity dynamic; file "data/named.run";
}; severity dynamic;
};
}; };
zone "." IN { zone "." IN {
@ -32,5 +31,7 @@ dynamic-db "ipa" {
library "ldap.so"; library "ldap.so";
arg "uri ldap://$FQDN"; arg "uri ldap://$FQDN";
arg "base cn=dns, $SUFFIX"; arg "base cn=dns, $SUFFIX";
arg "auth_method none"; arg "auth_method sasl";
arg "sasl_mech GSSAPI";
arg "sasl_user DNS/$FQDN";
}; };