2.4 Set root Ownership of BIND Directories

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

All of the directories under which ISC BIND runs should be owned by root. Of course, any files created at run time by BIND will still be owned by named.

Rationale:

Restricting ownership of the directories provides defense in depth and will reduce the probability of unauthorized modifications to those resources. If there was a BIND vulnerability that allowed code execution as the named user, then the code would not be able to modify permissions on the BIND directories owned by root.

Solution

To correct the directory ownership, perform the following:

chown -R root $BIND_HOME $RUNDIR

Default Value:

The following directories are owned by named in the default RHEL7 package install

- /var/named/dynamic
- /var/named/slaves
- /var/named/data
- /run/named

See Also

https://benchmarks.cisecurity.org/downloads/show-single/?file=bind.300

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: Unix

Control ID: 85c46d0a27a9532ca80f46b0d4ddba3ce52f79316e9e1ba7f5f997afa32b0e13