O'Reilly logo

Concise Guide to DNS and BIND, The by Nicolai Langfeldt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Customizing for Chrooted Environments

Before you even start trying to customize chrooted environments, you should set up a working named configuration. This kind of setup complicates things, so you should have a complete, working set of DNS database files and configurations before attempting this.

Chroot is a UNIX security mechanism that insulates the software that is chrooted from the rest of the filesystem. This ensures that even if the software proves to be insecure, a break-in will not compromise more than the insecure software and the other contents of the chroot jail; the rest of the system is protected. You can read more about chroot in your OS man pages chroot(1) and chroot(2). Its use is also the subject of programming and security texts ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required