Bv9ARM.ch07.html revision 7f723eabc5768f576470cd9cc82fd4af200013a1
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - Copyright (C) 2004-2006 Internet Systems Consortium, Inc. ("ISC")
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - Copyright (C) 2000-2003 Internet Software Consortium.
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - Permission to use, copy, modify, and distribute this software for any
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - purpose with or without fee is hereby granted, provided that the above
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - copyright notice and this permission notice appear in all copies.
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher - PERFORMANCE OF THIS SOFTWARE.
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<!-- $Id: Bv9ARM.ch07.html,v 1.116 2006/02/16 04:58:21 marka Exp $ -->
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<title>Chapter�7.�BIND 9 Security Considerations</title>
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<meta name="generator" content="DocBook XSL Stylesheets V1.69.1">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<link rel="prev" href="Bv9ARM.ch06.html" title="Chapter�6.�BIND 9 Configuration Reference">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<link rel="next" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
bfb40893be20b45279a40188cf16ef0eec1f9423Sumit Bose<tr><th colspan="3" align="center">Chapter�7.�<span class="acronym">BIND</span> 9 Security Considerations</th></tr>
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<a accesskey="p" href="Bv9ARM.ch06.html">Prev</a>�</td>
bfb40893be20b45279a40188cf16ef0eec1f9423Sumit Bose<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch08.html">Next</a>
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<div class="titlepage"><div><div><h2 class="title">
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher<a name="Bv9ARM.ch07"></a>Chapter�7.�<span class="acronym">BIND</span> 9 Security Considerations</h2></div></div></div>
45f75fc8e98092fa48faa3d180fd42f7efd51486Stephen Gallagher<dt><span class="sect1"><a href="Bv9ARM.ch07.html#Access_Control_Lists">Access Control Lists</a></span></dt>
45f75fc8e98092fa48faa3d180fd42f7efd51486Stephen Gallagher<dt><span class="sect1"><a href="Bv9ARM.ch07.html#id2573793"><span><strong class="command">chroot</strong></span> and <span><strong class="command">setuid</strong></span></a></span></dt>
45f75fc8e98092fa48faa3d180fd42f7efd51486Stephen Gallagher<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2573937">The <span><strong class="command">chroot</strong></span> Environment</a></span></dt>
45f75fc8e98092fa48faa3d180fd42f7efd51486Stephen Gallagher<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2573996">Using the <span><strong class="command">setuid</strong></span> Function</a></span></dt>
8be5e4497e5008f7807178acdfcbf97365ec4e73Stephen Gallagher<dt><span class="sect1"><a href="Bv9ARM.ch07.html#dynamic_update_security">Dynamic Update Security</a></span></dt>
8be5e4497e5008f7807178acdfcbf97365ec4e73Stephen Gallagher<div class="titlepage"><div><div><h2 class="title" style="clear: both">
b2c7b6fe7a6b9ef3af8d4d3037fe83d6e9bfd6a5Sumit Bose<a name="Access_Control_Lists"></a>Access Control Lists</h2></div></div></div>
b2c7b6fe7a6b9ef3af8d4d3037fe83d6e9bfd6a5Sumit Bose Access Control Lists (ACLs), are address match lists that
b2c7b6fe7a6b9ef3af8d4d3037fe83d6e9bfd6a5Sumit Bose you can set up and nickname for future use in <span><strong class="command">allow-notify</strong></span>,
505e75ba28b42bb3de7a6d55de825091b70cc2b2Stephen Gallagher <span><strong class="command">allow-query</strong></span>, <span><strong class="command">allow-recursion</strong></span>,
<span><strong class="command">blackhole</strong></span>, <span><strong class="command">allow-transfer</strong></span>,
zone "example.com" {
<a href="ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos" target="_top">ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos</a>
<a name="id2573793"></a><span><strong class="command">chroot</strong></span> and <span><strong class="command">setuid</strong></span></h2></div></div></div>
On UNIX servers, it is possible to run <span class="acronym">BIND</span> in a <span class="emphasis"><em>chrooted</em></span> environment
(<span><strong class="command">chroot()</strong></span>) by specifying the "<code class="option">-t</code>"
ability to run the daemon as an unprivileged user ( <code class="option">-u</code> <em class="replaceable"><code>user</code></em> ).
We suggest running as an unprivileged user when using the <span><strong class="command">chroot</strong></span> feature.
Here is an example command line to load <span class="acronym">BIND</span> in a <span><strong class="command">chroot()</strong></span> sandbox,
<span><strong class="command">/var/named</strong></span>, and to run <span><strong class="command">named</strong></span> <span><strong class="command">setuid</strong></span> to
<a name="id2573937"></a>The <span><strong class="command">chroot</strong></span> Environment</h3></div></div></div>
like <span><strong class="command">directory</strong></span> and <span><strong class="command">pid-file</strong></span> to account
<span class="emphasis"><em>not</em></span> need to compile <span><strong class="command">named</strong></span>
<a name="id2573996"></a>Using the <span><strong class="command">setuid</strong></span> Function</h3></div></div></div>