On 2021-09-24 09:57, Günther J. Niederwimmer wrote:
Hello Vladimir,
Am Freitag, 24. September 2021, 16:03:21 CEST schrieb Vladimír Čunát:
On 24/09/2021 15.43, Günther J. Niederwimmer
wrote:
I heard / read from a user that knot resolver
must have its own rights for
the certificate, but that is not possible, because the key is also
intended for other computers and this creates a system risk? Is this a
design problem or a bug?
I would not suggest that the private keys should be world-readable.
Normal installation uses a special user and group for running Knot
Resolver, so you might e.g. switch the file to this group.
Running the daemons as root would seem a higher risk to me, but
otherwise it shouldn't be a problem either. Of course, you can't change
that in kresd.conf, as that's done on systemd level already. I think it
should suffice to use `systemctl edit kresd@.service` and add
[Service]
User=root
Group=root
and the same with `systemctl edit kres-cache-gc.service`.
Unfortunately, that doesn't work that way? I then get error messages for the
paths and files in paths (permission denied)?
Apparently something is still being coded somewhere in the files? Since I
get
Lua errors
I am not a programmer, just a user, so I will not use "DNS over TLS" now and
try to use the knot-resolver sensibly to work!
I think what you need to do here, is
ensure that:
1) after adding the service Group && Name entries
2) ensure that the knot-resolver (kresd) working directory is owned by root
*as well as its contents* --
# cd /knot-resolver/working/directoy
# sudo chown -Rh root .
3) restart the knot-resolver service
HTH
--Chris
--
mit freundlichen Grüßen / best regards
Günther J. Niederwimmer