On 04/12/2017 06:18 PM, John R Pierce wrote:
On 4/12/2017 3:11 PM, Nicolas Kovacs wrote:
On my public servers, I usually run BIND for DNS. I see CentOS offers a
preconfigured (sort of) bind-chroot package. I wonder what's the
effective benefit of this vs. a "normal" BIND setup without chroot. On
my Slackware servers, I have a rather Keep-It-Simple approach to all
things security, e. g. run no unneed services, open only needed ports
etc. but I don't run the extra mile (and haven't been bitten so far).
Any suggestions? (No flamefest please.)
bind went through a rocky stage where there were a LOT of security
holes in it. by running it in a chroot, you limit its ability to be
used as a hacking point of entry. recent versions of bind
(basicially, 9 and newer) are much more secure, so this is less of a
concern.
But make sure to have SELinux enabled if you do not run it chrooted.
I have mine running that way.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos