Bv9ARM.ch07.html revision 2cbb4ab75757fbb656997a82c14ca07db37d481a
044d712d4d03f8354962d54e47cfac2346a69ccccilix - Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
044d712d4d03f8354962d54e47cfac2346a69ccccilix - Copyright (C) 2000-2003 Internet Software Consortium.
044d712d4d03f8354962d54e47cfac2346a69ccccilix - Permission to use, copy, modify, and distribute this software for any
044d712d4d03f8354962d54e47cfac2346a69ccccilix - purpose with or without fee is hereby granted, provided that the above
044d712d4d03f8354962d54e47cfac2346a69ccccilix - copyright notice and this permission notice appear in all copies.
044d712d4d03f8354962d54e47cfac2346a69ccccilix - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
044d712d4d03f8354962d54e47cfac2346a69ccccilix - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
044d712d4d03f8354962d54e47cfac2346a69ccccilix - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
044d712d4d03f8354962d54e47cfac2346a69ccccilix - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
044d712d4d03f8354962d54e47cfac2346a69ccccilix - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
044d712d4d03f8354962d54e47cfac2346a69ccccilix - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
044d712d4d03f8354962d54e47cfac2346a69ccccilix - PERFORMANCE OF THIS SOFTWARE.
044d712d4d03f8354962d54e47cfac2346a69ccccilix<!-- $Id: Bv9ARM.ch07.html,v 1.200 2009/07/04 01:13:18 tbox Exp $ -->
044d712d4d03f8354962d54e47cfac2346a69ccccilix<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
044d712d4d03f8354962d54e47cfac2346a69ccccilix<title>Chapter�7.�BIND 9 Security Considerations</title>
044d712d4d03f8354962d54e47cfac2346a69ccccilix<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
044d712d4d03f8354962d54e47cfac2346a69ccccilix<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
57678273bfa80d2feb4fa17ac25818f277f5c684cilix<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
57678273bfa80d2feb4fa17ac25818f277f5c684cilix<link rel="prev" href="Bv9ARM.ch06.html" title="Chapter�6.�BIND 9 Configuration Reference">
6b03b973a8d36d45d5345ba1013db10df1c7a5cecilix<link rel="next" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
57678273bfa80d2feb4fa17ac25818f277f5c684cilix<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
044d712d4d03f8354962d54e47cfac2346a69ccccilix<tr><th colspan="3" align="center">Chapter�7.�<acronym class="acronym">BIND</acronym> 9 Security Considerations</th></tr>
044d712d4d03f8354962d54e47cfac2346a69ccccilix<a accesskey="p" href="Bv9ARM.ch06.html">Prev</a>�</td>
044d712d4d03f8354962d54e47cfac2346a69ccccilix<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch08.html">Next</a>
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof<div class="titlepage"><div><div><h2 class="title">
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof<a name="Bv9ARM.ch07"></a>Chapter�7.�<acronym class="acronym">BIND</acronym> 9 Security Considerations</h2></div></div></div>
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof<dt><span class="sect1"><a href="Bv9ARM.ch07.html#Access_Control_Lists">Access Control Lists</a></span></dt>
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof<dt><span class="sect1"><a href="Bv9ARM.ch07.html#id2599921"><span><strong class="command">Chroot</strong></span> and <span><strong class="command">Setuid</strong></span></a></span></dt>
57678273bfa80d2feb4fa17ac25818f277f5c684cilix<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2600070">The <span><strong class="command">chroot</strong></span> Environment</a></span></dt>
6b03b973a8d36d45d5345ba1013db10df1c7a5cecilix<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2600130">Using the <span><strong class="command">setuid</strong></span> Function</a></span></dt>
3cfad782faf34c654ec837780ed7b3fe95e82c2eJohan B. C. Engelen<dt><span class="sect1"><a href="Bv9ARM.ch07.html#dynamic_update_security">Dynamic Update Security</a></span></dt>
e44b9de426cfa07c598fda61d214dc053a0706ddcilix<div class="titlepage"><div><div><h2 class="title" style="clear: both">
044d712d4d03f8354962d54e47cfac2346a69ccccilix<a name="Access_Control_Lists"></a>Access Control Lists</h2></div></div></div>
6b03b973a8d36d45d5345ba1013db10df1c7a5cecilix Access Control Lists (ACLs) are address match lists that
6b03b973a8d36d45d5345ba1013db10df1c7a5cecilix you can set up and nickname for future use in <span><strong class="command">allow-notify</strong></span>,
044d712d4d03f8354962d54e47cfac2346a69ccccilix <span><strong class="command">allow-query</strong></span>, <span><strong class="command">allow-query-on</strong></span>,
42aa2c4a2086ab56de7d139d356c8f9ab2942794Jabiertxof <span><strong class="command">allow-recursion</strong></span>, <span><strong class="command">allow-recursion-on</strong></span>,
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof <span><strong class="command">blackhole</strong></span>, <span><strong class="command">allow-transfer</strong></span>,
57678273bfa80d2feb4fa17ac25818f277f5c684cilix Using ACLs allows you to have finer control over who can access
4781f50aaa2d243abc172da7c6e4265357a3353bJabiertxof your name server, without cluttering up your config files with huge
d4200d96d8369f38efb722b04869b360388eeb80cilix lists of IP addresses.
57678273bfa80d2feb4fa17ac25818f277f5c684cilix It is a <span class="emphasis"><em>good idea</em></span> to use ACLs, and to
044d712d4d03f8354962d54e47cfac2346a69ccccilix control access to your server. Limiting access to your server by
044d712d4d03f8354962d54e47cfac2346a69ccccilix outside parties can help prevent spoofing and denial of service (DoS) attacks against
044d712d4d03f8354962d54e47cfac2346a69ccccilix your server.
044d712d4d03f8354962d54e47cfac2346a69ccccilix Here is an example of how to properly apply ACLs:
044d712d4d03f8354962d54e47cfac2346a69ccccilix// Set up an ACL named "bogusnets" that will block
044d712d4d03f8354962d54e47cfac2346a69ccccilix// RFC1918 space and some reserved space, which is
044d712d4d03f8354962d54e47cfac2346a69ccccilix// commonly used in spoofing attacks.
044d712d4d03f8354962d54e47cfac2346a69ccccilixacl bogusnets {
044d712d4d03f8354962d54e47cfac2346a69ccccilix// Set up an ACL called our-nets. Replace this with the
044d712d4d03f8354962d54e47cfac2346a69ccccilix// real IP numbers.
zone "example.com" {
<a href="ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos" target="_top">ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos</a>
<a name="id2599921"></a><span><strong class="command">Chroot</strong></span> and <span><strong class="command">Setuid</strong></span>
the "<code class="option">-t</code>" option for <span><strong class="command">named</strong></span>.
ability to run the daemon as an unprivileged user ( <code class="option">-u</code> <em class="replaceable"><code>user</code></em> ).
We suggest running as an unprivileged user when using the <span><strong class="command">chroot</strong></span> feature.
Here is an example command line to load <acronym class="acronym">BIND</acronym> in a <span><strong class="command">chroot</strong></span> sandbox,
<span><strong class="command">/var/named</strong></span>, and to run <span><strong class="command">named</strong></span> <span><strong class="command">setuid</strong></span> to
<a name="id2600070"></a>The <span><strong class="command">chroot</strong></span> Environment</h3></div></div></div>
From <acronym class="acronym">BIND</acronym>'s point of view, <code class="filename">/var/named</code> is
like <span><strong class="command">directory</strong></span> and <span><strong class="command">pid-file</strong></span> to account
<span class="emphasis"><em>not</em></span> need to compile <span><strong class="command">named</strong></span>
<a name="id2600130"></a>Using the <span><strong class="command">setuid</strong></span> Function</h3></div></div></div>