Otherwise you need to first make a copy of the zone so that you own the copy, then you can make changes.
You can see directly from the domain's control panel whether or not the handle you are logged in under can edit a zone.
The solution is to proceed by creating a copy of the zone and then following the instructions here to go through with the normal zonefile edit process.
I would give it at least 24hrs before putting in a support ticket. I added a new domain via the Control Panel over 7 hours ago, and I still can't get an answer from ns1.when I run dig.
You create a new host entry with A and PTR records by doing the following: You specify host aliases using CNAME records.
Aliases allow a single host computer to appear to be multiple host computers.
157.17183.private -rw------- 1 root bind 126 Nov 12 drwxrwsrwx 3 root bind 4.0K Nov 11 . -rw-r--r-- 1 root root 2.5K Oct 20 -rw-r--r-- 1 root root 237 Oct 20 db.0 -rw-r--r-- 1 root root 271 Oct 20 db.127 -rw-r--r-- 1 root root 237 Oct 20 db.255 -rw-r--r-- 1 root root 353 Oct 20 db.empty -rw-r--r-- 1 root root 270 Oct 20 db.local -rw-r--r-- 1 root root 3.0K Oct 20 -r--r--r-- 1 root bind 3 Nov 10 -rw-r--r-- 1 root bind 463 Nov 11 -rw-r--r-- 1 root bind 490 Oct 20 default-zones -rwxr-xr-x 1 root bind 503 Nov 12 local -rwxr-xr-x 1 root bind 462 Nov 11 -rw-r--r-- 1 root bind 572 Oct 20 options -rw-r----- 1 bind bind 77 Nov 10 drw-rw Srw- 2 root bind 109 Nov 12 zones -rw-r--r-- 1 root root 1.3K Oct 20 zones.rfc1918 drw-rw Srw- 2 root bind 109 Nov 12 . -r--r--r-- 1 root bind 402 Nov 11 zone -rw-rw-rw- 1 bind bind 0 Nov 12 -r--r--r-- 1 root bind 377 Nov 11 rev.241.2.You're absolutely right, I didn't set the permissions correctly for /etc/bind/zones which made the permissions for the file in it rather useless.
If you want to change the zonefile from the one that your domain is currently using to another one that is in your zone file portfolio, you can do this online.
It also manifests itself as named being unable to create custom log files.Red Hat Security Enhanced Linux (SELinux) policy security protections : Red Hat have adopted the National Security Agency's SELinux security policy (see and recommendations for security , which are more secure than running named in a chroot and make use of the bind-chroot environment unnecessary .By default, named is not allowed by the SELinux policy to write, create or delete any files EXCEPT in these directories: $ROOTDIR/var/named/slaves$ROOTDIR/var/named/data$ROOTDIR/var/tmp where $ROOTDIR may be set in /etc/sysconfig/named if bind-chroot is installed.A DNS zone is a subset, often a single domain, of the hierarchical domain name structure of the DNS.The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of text representations of resource records (RR).