Warning! Audit Deprecated
Information
RedHat Linux systems have a bind-chroot RPM containing a directory environment for running BIND in a chroot-ed file system. This is implemented by installing the RPMs below or even checking off BIND during the install process.
Rationale:
Use the chroot command to further limit potential damage from a successful exploit, the server should be running in an isolated compartment such as a chroot-ed jail or a Solaris zone. This way the daemon will be restricted in terms of what it can see or do
Solution
1. Install the following RPM's are installed:
- bind
- bind-chroot
- bind-libs
- bind-utils
2. Directory permissions should be hardened, as they are not secure by default.
3. A syslog socket needs to be created. Add '-a /var/named/chroot/dev/log' to SYSLOGD_OPTIONS in /etc/sysconfig/syslog. See section 5.3 for details on configuring named to use syslog. If a local log file is to be used, create a /var/log directory in /var/named/chroot.
4. Add 'ROOTDIR=/var/named/chroot' to /etc/sysconfig/named