a2a915
diff --git a/bin/named/named.8 b/bin/named/named.8
a2a915
index cd990a9..890be36 100644
a2a915
--- a/bin/named/named.8
a2a915
+++ b/bin/named/named.8
a2a915
@@ -358,6 +358,57 @@ The default configuration file\&.
a2a915
 /var/run/named/named\&.pid
a2a915
 .RS 4
a2a915
 The default process\-id file\&.
a2a915
+.PP
a2a915
+.SH "NOTES"
a2a915
+.PP
a2a915
+.TP
a2a915
+\fBRed Hat SELinux BIND Security Profile:\fR
a2a915
+.PP
a2a915
+By default, Red Hat ships BIND with the most secure SELinux policy
a2a915
+that will not prevent normal BIND operation and will prevent exploitation
a2a915
+of all known BIND security vulnerabilities . See the selinux(8) man page
a2a915
+for information about SElinux.
a2a915
+.PP
a2a915
+It is not necessary to run named in a chroot environment if the Red Hat
a2a915
+SELinux policy for named is enabled. When enabled, this policy is far
a2a915
+more secure than a chroot environment. Users are recommended to enable
a2a915
+SELinux and remove the bind-chroot package.
a2a915
+.PP
a2a915
+With this extra security comes some restrictions:
a2a915
+.PP
a2a915
+By default, the SELinux policy does not allow named to write any master
a2a915
+zone database files. Only the root user may create files in the $ROOTDIR/var/named
a2a915
+zone database file directory (the options { "directory" } option), where
a2a915
+$ROOTDIR is set in /etc/sysconfig/named.
a2a915
+.PP
a2a915
+The "named" group must be granted read privelege to
a2a915
+these files in order for named to be enabled to read them.
a2a915
+.PP
a2a915
+Any file created in the zone database file directory is automatically assigned
a2a915
+the SELinux file context named_zone_t .
a2a915
+.PP
a2a915
+By default, SELinux prevents any role from modifying named_zone_t files; this
a2a915
+means that files in the zone database directory cannot be modified by dynamic
a2a915
+DNS (DDNS) updates or zone transfers.
a2a915
+.PP
a2a915
+The Red Hat BIND distribution and SELinux policy creates three directories where
a2a915
+named is allowed to create and modify files: /var/named/slaves, /var/named/dynamic
a2a915
+/var/named/data. By placing files you want named to modify, such as
a2a915
+slave or DDNS updateable zone files and database / statistics dump files in
a2a915
+these directories, named will work normally and no further operator action is
a2a915
+required. Files in these directories are automatically assigned the 'named_cache_t'
a2a915
+file context, which SELinux allows named to write.
a2a915
+.PP
a2a915
+\fBRed Hat BIND SDB support:\fR
a2a915
+.PP
a2a915
+Red Hat ships named with compiled in Simplified Database Backend modules that ISC
a2a915
+provides in the "contrib/sdb" directory. Install bind-sdb package if you want use them
a2a915
+.PP
a2a915
+The SDB modules for LDAP, PostGreSQL, DirDB and SQLite are compiled into named-sdb.
a2a915
+.PP
a2a915
+See the documentation for the various SDB modules in /usr/share/doc/bind-sdb-*/ .
a2a915
+.br
a2a915
+.PP
a2a915
 .RE
a2a915
 .SH "SEE ALSO"
a2a915
 .PP