Bv9ARM.ch07.html revision f6d93187a121da71416026756e190169a135ce1b
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>BIND 9 Security Considerations</TITLE
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesNAME="GENERATOR"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCONTENT="Modular DocBook HTML Stylesheet Version 1.73
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesTITLE="BIND 9 Administrator Reference Manual"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesREL="PREVIOUS"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesTITLE="BIND 9 Configuration Reference"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesTITLE="Troubleshooting"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="chapter"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesBGCOLOR="#FFFFFF"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesTEXT="#000000"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesLINK="#0000FF"
70953fb44a7140fe206c3a5f011e24209c8c5c6abnicholesVLINK="#840084"
70953fb44a7140fe206c3a5f011e24209c8c5c6abnicholesALINK="#0000FF"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="NAVHEADER"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesSUMMARY="Header navigation table"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCELLPADDING="0"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCELLSPACING="0"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesALIGN="center"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>BIND 9 Administrator Reference Manual</TH
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesVALIGN="bottom"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesACCESSKEY="P"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesALIGN="center"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesVALIGN="bottom"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesALIGN="right"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesVALIGN="bottom"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesACCESSKEY="N"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="chapter"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Chapter 7. <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="acronym"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> 9 Security Considerations</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Table of Contents</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesHREF="Bv9ARM.ch07.html#Access_Control_Lists"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Access Control Lists</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesUNIX servers)</A
0a39e7683f6611d66c55712f50bb240428d832a1bnicholesHREF="Bv9ARM.ch07.html#dynamic_update_security"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Dynamic Update Security</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="sect1"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="sect1"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesNAME="Access_Control_Lists"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>7.1. Access Control Lists</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Access Control Lists (ACLs), are address match lists that
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesyou can set up and nickname for future use in <B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>allow-notify</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>allow-query</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>allow-recursion</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>blackhole</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>allow-transfer</B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Using ACLs allows you to have finer control over who can access
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesyour name server, without cluttering up your config files with huge
cb2846ded4de1abbb5934b92132baf826f1babfebnicholeslists of IP addresses.</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>It is a <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>good idea</I
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> to use ACLs, and to
cb2846ded4de1abbb5934b92132baf826f1babfebnicholescontrol access to your server. Limiting access to your server by
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesoutside parties can help prevent spoofing and DoS attacks against
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesyour server.</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Here is an example of how to properly apply ACLs:</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="programlisting"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> // Set up an ACL named "bogusnets" that will block RFC1918 space,
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes// which is commonly used in spoofing attacks.
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesacl bogusnets { 0.0.0.0/8; 1.0.0.0/8; 2.0.0.0/8; 192.0.2.0/24; 224.0.0.0/3; 10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16; };
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes// Set up an ACL called our-nets. Replace this with the real IP numbers.
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes allow-query { our-nets; };
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes allow-recursion { our-nets; };
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes blackhole { bogusnets; };
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes type master;
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes allow-query { any; };
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>This allows recursive queries of the server from the outside
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesunless recursion has been previously disabled.</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>For more information on how to use ACLs to protect your server,
cb2846ded4de1abbb5934b92132baf826f1babfebnicholessee the <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> advisory at
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesHREF="ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesTARGET="_top"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="sect1"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="sect1"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesNAME="AEN4665"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesUNIX servers)</A
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>On UNIX servers, it is possible to run <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="acronym"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="emphasis"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> environment
609ef720afd62ca63391c9fdb415cd2faf29aa46bnicholesCLASS="command"
609ef720afd62ca63391c9fdb415cd2faf29aa46bnicholes>) by specifying the "<TT
609ef720afd62ca63391c9fdb415cd2faf29aa46bnicholesCLASS="option"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesoption. This can help improve system security by placing <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="acronym"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesa "sandbox", which will limit the damage done if a server is compromised.</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Another useful feature in the UNIX version of <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="acronym"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesability to run the daemon as an unprivileged user ( <TT
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="option"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="replaceable"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesWe suggest running as an unprivileged user when using the <B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes> feature.</P
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>Here is an example command line to load <SPAN
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="acronym"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
8410c53aaf5e0372a19d5f4d2bc696b9c609ce3cbnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholes>, and to run <B
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
cb2846ded4de1abbb5934b92132baf826f1babfebnicholesCLASS="command"
HREF="Bv9ARM.ch06.html"
HREF="Bv9ARM.html"
HREF="Bv9ARM.ch08.html"