Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jan 2001 15:05:57 -0800 (PST)
From:      Matt Dillon <dillon@earth.backplane.com>
To:        Alfred Perlstein <bright@wintelcom.net>
Cc:        Brian Behlendorf <brian@collab.net>, Roman Shterenzon <roman@xpert.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind
Message-ID:  <200101312305.f0VN5vJ19469@earth.backplane.com>
References:  <20010131140447.E26076@fw.wintelcom.net> <Pine.BSF.4.31.0101311447150.729-100000@localhost> <20010131145423.H26076@fw.wintelcom.net>

next in thread | previous in thread | raw e-mail | index | archive | help
:> [yez] 2:47pm ~ > fgrep -i named_flag /etc/defaults/rc.conf
:> named_flags=""			# Flags for named
:> #named_flags="-u bind -g bind"	# Flags for named
:
:Since named supports a command line option for chroot as well
:as user flags (-t) it would be trivial to have it the defaultt.
:
:It's pretty much a toss-up between usability and security.
:
:I guess this is the final blow for me, and I think we should
:run bind in a sandbox at this point, I'm just worried about
:confusing newbies who wish to set it up.
:
:If anyone has a proposal on doing it by default that doesn't
:impact ease of use (or if already doesn't impact it) then I'm
:for it.
:
:What I'm worrying about specifically is ndc and other utilities
:basically are unix domain sockets not in the expected place all of
:sudden?
:
:-- 
:-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
:"I have the heart of a child; I keep it in a jar on my desk."

    Quite a few people have been using the sandbox options in the
    last year without any ill effects (I was the original author of
    the feature).  The only issue is that you cannot HUP named (it will
    not be able to rebind its sockets), you can only restart it, and
    you have to supply the proper options to ndc when restarting it
    (-u bind -g bind).  I usually restart it anyway (I don't trust the
    named HUP code).

    I think we can easily make it the default.

    By the way, I seem to recall someone posting some chown's/chmod's
    for /etc/namedb to run it in a sandbox that were wrong.  *ALL*
    files in /etc/namedb except the 's/' subdirectory should be root.wheel,
    modes 644.  The 's/' subdirectory should be user bind, group bind,
    modes 775.  The only directory named needs to write to is 
    /etc/namedb/s (for secondaries) and /var/run (for the pid file).

    -

    Using named's chrooting option is a more drastic approach, but also
    doable as a default IFF we compile named and named-xfer statically
    by default.  Neither this mode of operation nor the jail mode has
    been widely tested.  The sandbox options have been tested widely.

						-Matt


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101312305.f0VN5vJ19469>