Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.protocols.dns.bind > #16006
| From | tale <d.lawrence@salesforce.com> |
|---|---|
| Newsgroups | comp.protocols.dns.bind |
| Subject | Re: /etc/bind.keys in a chrooted environment |
| Date | 2020-07-22 11:34 -0400 |
| Message-ID | <mailman.748.1595432060.942.bind-users@lists.isc.org> (permalink) |
| References | (2 earlier) <d379bee3-e9e5-a9e8-49d9-b92a6bab34a3@suse.de> <295f1ecf-341a-fdc4-96d9-503776a411e7@ripe.net> <2193fa25-9b7c-6a01-ede7-e6d46676cd32@suse.de> <d5f0523a-ed8d-a9cd-f6e1-7487d003ce35@ripe.net> <CAGrdBBvEZdJ1XHOXutxqMTE1cnGXhhyiN5sa=jy=5mzt5VS07A@mail.gmail.com> |
On Wed, Jul 22, 2020 at 11:05 AM Anand Buddhdev <anandb@ripe.net> wrote: > There is no harm in copying the file into the chroot. It will get rid of > the warning. With the caveat that you have to be sure that if you keep the original copy outside of the chroot, you have to be sure updates get reflected inside the chroot. NAMED_CONF_INCLUDE_FILES mentioned in the OP seems to be a SuSE-ism and I didn't dig into whatever bearing it might have for maintenance of the chroot. -- tale
Back to comp.protocols.dns.bind | Previous | Next | Find similar
Re: /etc/bind.keys in a chrooted environment tale <d.lawrence@salesforce.com> - 2020-07-22 11:34 -0400
csiph-web