>> Now the private key is inaccessible to the named process, which is 
>> running as user bind. User bind is a member of group bind.

> Any time a private key file is rewritten, the mode is changed to 600.
> There's no rule that it has to be owned by root, though; could you just chown 
> it to user bind?

>> Aside from this, is the permissions change made by dnssec-settime a 
>> feature or a bug?

> I consider it a feature, though opinions may vary.

After a more careful review of Bv9ARM.pdf, this behavior is documented on p. 
150 in the "Description" section of dnssec-settime: "The private file's 
permissions are always set to be inaccessible to anyone other than the owner 
(mode 0600)." In light of some of the other responses to your post, perhaps it 
would be useful to give this statement greater emphasis typographically in the 
ARM, e.g. a "Note" box. You might also consider adding the following statement: 
"We therefore recommend that the owner of all key files be set using the 
<command>chown</command> utility to the same UID as that under which the named 
process is running (see <command>named -u</command> in section B.11)." This 
issue also merits a comment in section 7.2.2 "Using the setuid Function" on 
page 116. A second and third sentence might read: "Use the 
<command>chown</command> utility to set the user id of all DNSSEC key files, as 
these must be readable by <acronym>BIND</acronym>. Note that the mode of 
private ke
 y files will be set to 0600 by <command>dnssec-settime</command> (section 
B.7)."

Jeffry A. Spain
Network Administrator
Cincinnati Country Day School

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to