Information
All of the directories under which ISC BIND runs should be owned by root. Of course, any files created at run time by BIND will still be owned by named.
Rationale:
Restricting ownership of the directories provides defense in depth and will reduce the probability of unauthorized modifications to those resources. If there was a BIND vulnerability that allowed code execution as the named user, then the code would not be able to modify permissions on the BIND directories owned by root.
Solution
To correct the directory ownership, perform the following:
chown -R root $BIND_HOME $RUNDIR
Default Value:
The following directories are owned by named in the default RHEL7 package install
- /var/named/dynamic
- /var/named/slaves
- /var/named/data
- /run/named