[system-administrators-guide] Updates to note about directory used for BIND runtime data Original notes was in reference to: Bug 9
stephenw
stephenw at fedoraproject.org
Wed Nov 13 13:29:24 UTC 2013
commit 565abb3a2e985cb3b10a46cf2240a48ba3b58233
Author: Stephen Wadeley <swadeley at redhat.com>
Date: Wed Nov 13 13:49:11 2013 +0100
Updates to note about directory used for BIND runtime data
Original notes was in reference to:
Bug 977413 - named: "PID file has been moved to /run/named/named.pid" should be documented
en-US/BIND.xml | 5 ++---
1 files changed, 2 insertions(+), 3 deletions(-)
---
diff --git a/en-US/BIND.xml b/en-US/BIND.xml
index a216ebf..f689c9a 100644
--- a/en-US/BIND.xml
+++ b/en-US/BIND.xml
@@ -437,10 +437,9 @@ options {
<note>
<para>
- In Fedora 19, the <systemitem class="daemon">named</systemitem> PID file has been moved from the default location <filename>/var/run/named/named.pid</filename> to the new location <filename>/run/named/named.pid</filename>
+ In Fedora 19, the <systemitem class="daemon">named</systemitem> directory used for runtime data has been moved from the BIND default location, <filename>/var/run/named</filename>, to a new location <filename>/run/named</filename>. As a result, the PID file has been moved from the default location <filename>/var/run/named/named.pid</filename> to the new location <filename>/run/named/named.pid</filename>. In addition, the session-key file has been moved to <filename>/run/named/session.key</filename>.
</para>
- </note>
- <important>
+ </note> <important>
<title>Restrict recursive servers to selected clients only</title>
<para>
To prevent distributed denial of service (DDoS) attacks, it is recommended that you use the <option>allow-query-cache</option> option to restrict recursive DNS services for a particular subset of clients only.
More information about the docs-commits
mailing list