3fed71e
diff --git a/bin/named/named.8 b/bin/named/named.8
3fed71e
index ef10ef4..3150b22 100644
3fed71e
--- a/bin/named/named.8
3fed71e
+++ b/bin/named/named.8
3fed71e
@@ -349,6 +349,63 @@ The default configuration file\&.
3fed71e
 /var/run/named/named\&.pid
Adam Tkac c30533e
 .RS 4
3fed71e
 The default process\-id file\&.
jvdias 667fce2
+.PP
jvdias 667fce2
+.SH "NOTES"
jvdias 667fce2
+.PP
jvdias 667fce2
+.TP
jvdias 667fce2
+\fBRed Hat SELinux BIND Security Profile:\fR
jvdias 667fce2
+.PP
jvdias 667fce2
+By default, Red Hat ships BIND with the most secure SELinux policy
jvdias 667fce2
+that will not prevent normal BIND operation and will prevent exploitation
jvdias 667fce2
+of all known BIND security vulnerabilities . See the selinux(8) man page
jvdias 667fce2
+for information about SElinux.
jvdias 667fce2
+.PP
jvdias 667fce2
+It is not necessary to run named in a chroot environment if the Red Hat
jvdias 667fce2
+SELinux policy for named is enabled. When enabled, this policy is far
jvdias 667fce2
+more secure than a chroot environment. Users are recommended to enable
jvdias 667fce2
+SELinux and remove the bind-chroot package.
jvdias 667fce2
+.PP
jvdias 667fce2
+With this extra security comes some restrictions:
jvdias 667fce2
+.PP
jvdias 667fce2
+By default, the SELinux policy does not allow named to write any master
jvdias 667fce2
+zone database files. Only the root user may create files in the $ROOTDIR/var/named
jvdias 667fce2
+zone database file directory (the options { "directory" } option), where
jvdias 667fce2
+$ROOTDIR is set in /etc/sysconfig/named.
jvdias 667fce2
+.PP
3fed71e
+The "named" group must be granted read privelege to
3fed71e
+these files in order for named to be enabled to read them.
jvdias 667fce2
+.PP
jvdias 667fce2
+Any file created in the zone database file directory is automatically assigned
jvdias 667fce2
+the SELinux file context named_zone_t .
jvdias 667fce2
+.PP
jvdias 667fce2
+By default, SELinux prevents any role from modifying named_zone_t files; this
jvdias 667fce2
+means that files in the zone database directory cannot be modified by dynamic
jvdias 667fce2
+DNS (DDNS) updates or zone transfers.
jvdias 667fce2
+.PP
Adam Tkac 7fdb7fd
+The Red Hat BIND distribution and SELinux policy creates three directories where
Adam Tkac 7fdb7fd
+named is allowed to create and modify files: /var/named/slaves, /var/named/dynamic
Adam Tkac 7fdb7fd
+/var/named/data. By placing files you want named to modify, such as
3fed71e
+slave or DDNS updateable zone files and database / statistics dump files in
jvdias 667fce2
+these directories, named will work normally and no further operator action is
jvdias 667fce2
+required. Files in these directories are automatically assigned the 'named_cache_t'
jvdias 667fce2
+file context, which SELinux allows named to write.
jvdias 667fce2
+.PP
Adam Tkac edea69c
+\fBRed Hat BIND SDB support:\fR
jvdias 667fce2
+.PP
Adam Tkac edea69c
+Red Hat ships named with compiled in Simplified Database Backend modules that ISC
Adam Tkac 15c5cd7
+provides in the "contrib/sdb" directory. Install bind-sdb package if you want use them
jvdias 667fce2
+.PP
Adam Tkac 15c5cd7
+The SDB modules for LDAP, PostGreSQL, DirDB and SQLite are compiled into named-sdb.
jvdias 667fce2
+.PP
jvdias 667fce2
+See the documentation for the various SDB modules in /usr/share/doc/bind-sdb-*/ .
jvdias 667fce2
+.br
jvdias 667fce2
+.PP
jvdias 667fce2
+\fBRed Hat system-config-bind:\fR
jvdias 667fce2
+.PP
jvdias 667fce2
+Red Hat provides the system-config-bind GUI to configure named.conf and zone
jvdias 667fce2
+database files. Run the "system-config-bind" command and access the manual
jvdias 667fce2
+by selecting the Help menu.
jvdias 667fce2
+.PP
Adam Tkac c30533e
 .RE
jvdias 667fce2
 .SH "SEE ALSO"
jvdias 667fce2
 .PP