Customizing for Chrooted Environments

Before you even start trying to customize chrooted environments, you should set up a working named configuration. This kind of setup complicates things, so you should have a complete, working set of DNS database files and configurations before attempting this.

Chroot is a UNIX security mechanism that insulates the software that is chrooted from the rest of the filesystem. This ensures that even if the software proves to be insecure, a break-in will not compromise more than the insecure software and the other contents of the chroot jail; the rest of the system is protected. You can read more about chroot in your OS man pages chroot(1) and chroot(2). Its use is also the subject of programming and security texts ...

Get Concise Guide to DNS and BIND, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.