[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Securing bind..



<quote who="Petre Daniel">
> Well,i know Karsten's on my back and all,but i have not much time
> to  learn,and too many things to do at my firm,so i am asking if
> one of you has  any idea how can bind be protected against that DoS
> attack and if someone  has some good firewall for a dns server (
> that resolves names for internal  clients and also keeps some .ro
> domains) please post it to the list.. both  ipchains and iptables
> variants are welcome..
> thank you.

i ran a search for dos in my recent debian-user archives
and did not come up with anything(related), which DOS attack?
i monitor bugtraq and vuln-dev closely and have not seen
any mention of bind for a REAL long time.

i run BIND 8 as all my nameservers. i change the
configuration from what debian has significantly.
everything resides under /etc/bind. everything
is chowned named.named everything is readable by
only user named/group named. named runs in chroot
in /etc/bind and runs as user named group named.
i restrict zone transfers to authorized servers only.
if needed(like on a firewall or gateway), i have
it bind to a specific interface(the internal one,
or the loopback or both depending on your needs).
more recently i have started working with syslog-ng
and remote logging, i configured syslogd on
the debian systems to create a log socket inside
the bind chroot enviornment so i can send the named
logs to the syslog server(because it cannot access
/dev/log otherwise). before that i had bind log
to a file inside the chroot enviornment.

bind has worked good for me for years. if its configured
good it can be quite secure. i reccomend the book
from oreilley(sp?) DNS & Bind, thats where i initially
learned about the chroot and running as non root
uid/gid and access lists. the information is elsewhere
as well but i found that book very interesting and
useful. you can go farther by restricting queries
via access lists as well, but this(in my experience)
will break any nameserver that is primary or
secondary for a domain, as nobody but those in
the access lists will be able to query for the
domain info. useful for the more paranoid
in a caching-only enviornment(or at least
a non-public DNS).

hope this helps!

nate





Reply to: