Date: Mon, 14 Dec 1998 18:43:56 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Dag-Erling Smorgrav <des@flood.ping.uio.no> Cc: committers@FreeBSD.ORG Subject: Re: Bind sandbox bogosity Message-ID: <199812150243.SAA50480@apollo.backplane.com> References: <xzpvhjembb6.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
The first problem is a non-problem, i.e. a bogus warning because HUPing named does not change it's pid. The second problem is real, and I did mention it. However, my feeling is that running named in a sandbox is a basic security precaution that must be taken and that the vast majority of configurations will not have a problem with it. It would be nice if there were a way to turn off the interface scanning junk, though. named is the only major program I know that does that (a Vixie bogosity, in my view). -Matt Matthew Dillon Engineering, HiWay Technologies, Inc. & BEST Internet Communications & God knows what else. <dillon@backplane.com> (Please include original email in any response) : :One side-effect of forcing named to run as bind:bind is that when you :HUP it, it tries to recreate the pid file (update_pid_file(), which is :called from load_configuration(), both in ns_config.c), but can't :because it doesn't have privs any more and /var/run is only writeable :by root. Another, far more serious, side-effect is that when it :rescans interfaces (normally every 60 minutes) and finds an interface :it wasn't already bound to, it'll try to bind to it, and fail :miserably because only root can bind to port 53. : :Solution 1: don't run named as bind:bind (and consequently back out : revision 1.64 of src/etc/rc.conf and revisions 1.33 and 1.32 of : src/etc/mtree/BSD.root.dist) : :Solution 2: hack bind to temporarily regain privs when HUPed. : :DES :-- :Dag-Erling Smorgrav - des@flood.ping.uio.no : : To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199812150243.SAA50480>