SELinux security policy (see <linkxmlns:xlink="http://www.w3.org/1999/xlink"xlink:href="http://www.nsa.gov/selinux"><http://www.nsa.gov/selinux></link>)
and recommendations for BIND security , which are more
secure than running named in a chroot and make use of
the bind-chroot environment unnecessary .
...
...
@@ -1403,8 +1397,8 @@ named_cache_t: for files modifiable by named - $ROOTDIR/var/{tmp,named/{slaves,d