Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Nov 1999 17:21:12 -0600 (CST)
From:      "Craig H. Rowland" <crowland@psionic.com>
To:        Brett Glass <brett@lariat.org>
Cc:        security@freebsd.org
Subject:   Re: Why not sandbox BIND?
Message-ID:  <Pine.LNX.4.10.9911111715070.4354-100000@dolemite.psionic.com>
In-Reply-To: <4.2.0.58.19991111160840.042469d0@localhost>

index | next in thread | previous in thread | raw e-mail

BIND 8.x allows one to chroot() it very easily. There are even built in
command line options to facilitate this. I wrote a quick document up on
how to do this for OpenBSD a while back. Since they now run BIND
chroot()ed by default now it may be moot, but still contains useful
information that apply directly to the FreeBSD platform. Such a simple
precaution as running BIND in a chroot() area can really prevent a lot of
problems if something goes wrong. I personally wouldn't run BIND without
this protection. 

http://www.psionic.com/papers/dns/dns-openbsd/


-- Craig


On Thu, 11 Nov 1999, Brett Glass wrote:

> OpenBSD sandboxes BIND, which means that most of the vulnerabilities in the 
> CERT advisory would be moot.
> 
> Should the same be done by default in FreeBSD? There's no reason for BIND 
> to be privileged.
> 
> --Brett
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.10.9911111715070.4354-100000>