<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://tnt.aufbix.org/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>tnt.aufbix.org bind</title>
        <description></description>
        <link>https://tnt.aufbix.org/</link>
        <lastBuildDate>Thu, 16 Apr 2026 01:57:56 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://tnt.aufbix.org/ttps://tnt.aufbix.org/lib/tpl/arctic/images/favicon.ico</url>
            <title>tnt.aufbix.org</title>
            <link>https://tnt.aufbix.org/</link>
        </image>
        <item>
            <title>bind:caching-only-config</title>
            <link>https://tnt.aufbix.org/bind/caching-only-config?rev=1260226863&amp;do=diff</link>
            <description>Simple Forwarding/caching-only BIND configuration

named.caching-nameserver.conf

/etc/named.rfc1912.zones</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>bind</category>
            <pubDate>Tue, 08 Dec 2009 00:01:03 +0000</pubDate>
        </item>
        <item>
            <title>bind:chroot</title>
            <link>https://tnt.aufbix.org/bind/chroot?rev=1262911396&amp;do=diff</link>
            <description>Chrooting BIND9 in Debian
 apt-get install bind9
For security reasons we want to run BIND chrooted so we have to do the following steps:
 /etc/init.d/bind9 stop
Edit the file /etc/default/bind9 so that the daemon will run as the unprivileged user 'bind', chrooted to /var/lib/named. Modify the line:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>bind</category>
            <pubDate>Fri, 08 Jan 2010 01:43:16 +0000</pubDate>
        </item>
        <item>
            <title>bind:remote-zone-update</title>
            <link>https://tnt.aufbix.org/bind/remote-zone-update?rev=1365597568&amp;do=diff</link>
            <description>BIND configuration

Generate a key using the dnssec-keygen utility like this:
 dnssec-keygen -a HMAC-MD5 -b 512 -n USER user.domain.com.
and this will create two files like this:
 Kuser.domain.com.+157+47950.key
 Kuser.domain.com.+157+47950.private
Using the information from the public key add to your dns server configuration the key:</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>bind</category>
            <pubDate>Wed, 10 Apr 2013 14:39:28 +0000</pubDate>
        </item>
        <item>
            <title>bind:sidebar</title>
            <link>https://tnt.aufbix.org/bind/sidebar?rev=1260226732&amp;do=diff</link>
            <description>BIND

	*  General BIND TNT
	*  General linux tips for BIND
	*  Chrooting BIND
	*  Split view in BIND
	*  Remote Zone Updating
	*  Caching-only Config

elsewhere

	*  Secure BIND template</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>bind</category>
            <pubDate>Mon, 07 Dec 2009 23:58:52 +0000</pubDate>
        </item>
        <item>
            <title>bind:splitview</title>
            <link>https://tnt.aufbix.org/bind/splitview?rev=1243204499&amp;do=diff</link>
            <description>Overview

This is applicable when you're running a caching nameserver for your internal network, but also wish to publically serve (publish) your domain(s) from the same nameserver.

	*  Enable split views to allow for differentiated access control
		*</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>bind</category>
            <pubDate>Mon, 25 May 2009 00:34:59 +0000</pubDate>
        </item>
    </channel>
</rss>
