Your message dated Sun, 23 Jul 2017 13:45:39 +0200
with message-id 
<CAFX5sbyYJ5Uz7tts4EeyqCgJ=vfmpgrdpw-_estxdbf0krz...@mail.gmail.com>
and subject line Closing
has caused the Debian Bug report #721015,
regarding samba-ad-dc: documentation fix for named.txt from setup
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
721015: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721015
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: samba-ad-dc
Version: 2:4.0.8+dfsg-1
Severity: minor

Dear Maintainer,

During the setup of a samba4 server the user will read
/var/lib/samba/private/named.txt which is installed from
/usr/share/samba/setup/named.txt.
With this patch the user can paste the chgrp command and
ignore the information about what Fedora 9 does:

diff --git a/source4/setup/named.txt b/source4/setup/named.txt
index d0657dd..a9b14c9 100644
--- a/source4/setup/named.txt
+++ b/source4/setup/named.txt
@@ -18,13 +18,13 @@ tkey-gssapi-keytab "${DNS_KEYTAB_ABS}";
 
 # 2. Set appropriate ownership and permissions on the ${DNS_KEYTAB} file.  
 #    Note that the most distributions have BIND configured to run under a 
-#    non-root user account.  For example, Fedora 9 runs BIND as the user 
-#    "named" once the daemon relinquishes its rights.  Therefore, the file 
+#    non-root user account.  Debian runs BIND as the user 
+#    "bind" once the daemon relinquishes its rights.  Therefore, the file 
 #    ${DNS_KEYTAB} must be readable by the user that BIND run as.  If BIND 
 #    is running as a non-root user, the "${DNS_KEYTAB}" file must have its 
-#    permissions altered to allow the daemon to read it.  Under Fedora 9, 
-#    execute the following commands:
-chgrp named ${DNS_KEYTAB_ABS}
+#    permissions altered to allow the daemon to read it.
+#    Execute the following commands:
+chgrp bind ${DNS_KEYTAB_ABS}
 chmod g+r ${DNS_KEYTAB_ABS}
 
 # 3. Ensure the BIND zone file(s) that will be dynamically updated are in 


Thank you.

Regards

        Noël

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.10-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

--- End Message ---
--- Begin Message ---
Version: 2:4.2.1+dfsg-1

This was fixed by:

commit 0ca9c74f91d5e727d5d37d324d4f1b396e75b1ae
Author: Andrew Bartlett <[email protected]>
Date:   Wed Aug 28 13:35:47 2013 +1200

    provision: Rewrite named.txt to be more useful

    We already chown the dns.keytab file, so remove the suggestion to do that,
    and instead explain why we can not use chroot (an often-requested feature).

First released in 4.2.0. Thanks Andrew!

Regards

-- 
Mathieu Parent

--- End Message ---

Reply via email to