10 - RedHat bind-chroot Rpm

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

RedHat Linux systems have a bind-chroot RPM containing a directory environment for running BIND in a chroot-ed file system. This is implemented by installing the RPMs below or even checking off BIND during the install process.

Rationale:

Use the chroot command to further limit potential damage from a successful exploit, the server should be running in an isolated compartment such as a chroot-ed jail or a Solaris zone. This way the daemon will be restricted in terms of what it can see or do

Solution

1. Install the following RPM's are installed:
- bind
- bind-chroot
- bind-libs
- bind-utils
2. Directory permissions should be hardened, as they are not secure by default.
3. A syslog socket needs to be created. Add '-a /var/named/chroot/dev/log' to SYSLOGD_OPTIONS in /etc/sysconfig/syslog. See section 5.3 for details on configuring named to use syslog. If a local log file is to be used, create a /var/log directory in /var/named/chroot.
4. Add 'ROOTDIR=/var/named/chroot' to /etc/sysconfig/named

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(5), CSCv6|2.2

Plugin: Unix

Control ID: 29e44fa7849f86da14ba29f5d1e6f905b638a7ca00d6025f6284401ec01c6f8d