From owner-freebsd-security Tue May 16 5:21:57 2000 Delivered-To: freebsd-security@freebsd.org Received: from closed-networks.com (closed-networks.com [195.153.248.242]) by hub.freebsd.org (Postfix) with SMTP id 6BDD737B700 for ; Tue, 16 May 2000 05:21:53 -0700 (PDT) (envelope-from udp@closed-networks.com) Received: (qmail 7451 invoked by uid 1021); 16 May 2000 12:26:14 -0000 Date: Tue, 16 May 2000 13:00:10 +0100 From: User Datagram Protocol To: Frank Tobin Subject: Re: pid file for named Message-ID: <20000516130010.K2139@closed-networks.com> Reply-To: User Datagram Protocol References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0.1i In-Reply-To: ; from ftobin@uiuc.edu on Tue, May 16, 2000 at 06:48:05AM -0500 X-Echelon: MI6 Cobra GCHQ Panavia MI5 Timberline IRA NSA Mossad CIA Copperhead Organization: Closed Networks Limited, London, UK Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, May 16, 2000 at 06:48:05AM -0500, Frank Tobin wrote: > One often wishes to run daemons such as named under other users, e.g., > bind:bind. In order to allow bind to write out zones and associated fun > stuff correctly, one then does a > > chmod -R bind:bind /etc/named > > However, the pid file, /var/run/named.pid, which named tries to write out ... I agree, for pre-jail FreeBSD versions, but the use of a jail would make it a bit of a moot point, wouldn't it? -- Bruce M. Simpson aka 'udp' Security Analyst & UNIX Development Engineer WWW: www.closed-networks.com/~udp Dundee www.packetfactory.net/~udp United Kingdom email: udp@closed-networks.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message