Bv9ARM.ch07.html revision def82e8de9ff45e29ab21e5aba9a39539138c1f4
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - Copyright (C) 2004-2014 Internet Systems Consortium, Inc. ("ISC")
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - Permission to use, copy, modify, and/or distribute this software for any
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson - purpose with or without fee is hereby granted, provided that the above
c13b8351b4dfb18806af4eb3c0fea240d83d1f82Andreas Gustafsson - copyright notice and this permission notice appear in all copies.
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
c13b8351b4dfb18806af4eb3c0fea240d83d1f82Andreas Gustafsson - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson - PERFORMANCE OF THIS SOFTWARE.
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson<title>Chapter�7.�BIND 9 Security Considerations</title>
55e5c51e661e23e24573db84114a3837817745c9Evan Hunt<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
87708bde16713bc02ff2598f4a82f98c699a2f2dMark Andrews<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
b947e1a521c6931f787d6d1b3604d5b138170c3dMukund Sivaraman<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson<link rel="prev" href="Bv9ARM.ch06.html" title="Chapter�6.�BIND 9 Configuration Reference">
ca44fe49bec16436cd95ace0af2e244f2096b284Brian Wellington<link rel="next" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
dd977047669f15fe3ea1a977871d7678cebf5082Andreas Gustafsson<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
a185ac41ac0627ec711d13bf6fdd8a830b753060Andreas Gustafsson<table width="100%" summary="Navigation header">
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<tr><th colspan="3" align="center">Chapter�7.�<acronym class="acronym">BIND</acronym> 9 Security Considerations</th></tr>
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<a accesskey="p" href="Bv9ARM.ch06.html">Prev</a>�</td>
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch08.html">Next</a>
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<div class="titlepage"><div><div><h2 class="title">
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<a name="Bv9ARM.ch07"></a>Chapter�7.�<acronym class="acronym">BIND</acronym> 9 Security Considerations</h2></div></div></div>
17be07ab818846dffb79e898da888a29c919bb02Mark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch07.html#Access_Control_Lists">Access Control Lists</a></span></dt>
17be07ab818846dffb79e898da888a29c919bb02Mark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch07.html#id2607129"><span><strong class="command">Chroot</strong></span> and <span><strong class="command">Setuid</strong></span></a></span></dt>
17be07ab818846dffb79e898da888a29c919bb02Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2607210">The <span><strong class="command">chroot</strong></span> Environment</a></span></dt>
17be07ab818846dffb79e898da888a29c919bb02Mark Andrews<dt><span class="sect2"><a href="Bv9ARM.ch07.html#id2607270">Using the <span><strong class="command">setuid</strong></span> Function</a></span></dt>
7beeb415ca3f1b230d35a8d385d99d2901cf9ff9Andreas Gustafsson<dt><span class="sect1"><a href="Bv9ARM.ch07.html#dynamic_update_security">Dynamic Update Security</a></span></dt>
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<div class="titlepage"><div><div><h2 class="title" style="clear: both">
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson<a name="Access_Control_Lists"></a>Access Control Lists</h2></div></div></div>
a185ac41ac0627ec711d13bf6fdd8a830b753060Andreas Gustafsson Access Control Lists (ACLs) are address match lists that
0e9dcd548051a8ec34744bfa18b4e09fea742a39Andreas Gustafsson you can set up and nickname for future use in
7beeb415ca3f1b230d35a8d385d99d2901cf9ff9Andreas Gustafsson <span><strong class="command">allow-notify</strong></span>, <span><strong class="command">allow-query</strong></span>,
7beeb415ca3f1b230d35a8d385d99d2901cf9ff9Andreas Gustafsson <span><strong class="command">allow-query-on</strong></span>, <span><strong class="command">allow-recursion</strong></span>,
5a505fc4c2e99842052d9409790c7da0b5663bceMukund Sivaraman <span><strong class="command">blackhole</strong></span>, <span><strong class="command">allow-transfer</strong></span>,
5a505fc4c2e99842052d9409790c7da0b5663bceMukund Sivaraman <span><strong class="command">match-clients</strong></span>, etc.
10dd5f62f27b050c0e51d85cbd97e2f5925eb9acMukund Sivaraman Using ACLs allows you to have finer control over who can access
10dd5f62f27b050c0e51d85cbd97e2f5925eb9acMukund Sivaraman your name server, without cluttering up your config files with huge
zone "example.com" {
This allows authoritative queries for "example.com" from any
<span><strong class="command">geoip [<span class="optional">db <em class="replaceable"><code>database</code></em></span>] <em class="replaceable"><code>field</code></em> <em class="replaceable"><code>value</code></em></strong></span>
used, otherwise the full description must be used (e.g.
and searches for region (i.e., state or province) can be
<a name="id2607129"></a><span><strong class="command">Chroot</strong></span> and <span><strong class="command">Setuid</strong></span>
the "<code class="option">-t</code>" option for <span><strong class="command">named</strong></span>.
ability to run the daemon as an unprivileged user ( <code class="option">-u</code> <em class="replaceable"><code>user</code></em> ).
We suggest running as an unprivileged user when using the <span><strong class="command">chroot</strong></span> feature.
Here is an example command line to load <acronym class="acronym">BIND</acronym> in a <span><strong class="command">chroot</strong></span> sandbox,
<span><strong class="command">/var/named</strong></span>, and to run <span><strong class="command">named</strong></span> <span><strong class="command">setuid</strong></span> to
<a name="id2607210"></a>The <span><strong class="command">chroot</strong></span> Environment</h3></div></div></div>
From <acronym class="acronym">BIND</acronym>'s point of view, <code class="filename">/var/named</code> is
like <span><strong class="command">directory</strong></span> and <span><strong class="command">pid-file</strong></span> to account
<span class="emphasis"><em>not</em></span> need to compile <span><strong class="command">named</strong></span>
<a name="id2607270"></a>Using the <span><strong class="command">setuid</strong></span> Function</h3></div></div></div>