Authoritative and caching

Timothe Litt litt at acm.org
Sun Mar 16 10:07:46 UTC 2025


On 15-Mar-25 18:16, Lee wrote:
> On Sat, Mar 15, 2025 at 5:25 PM Danjel Jungersen via bind-users
> <bind-users at lists.isc.org> wrote:
>> Apparmor was also mentioned, I have no experience with that, and have not changed it in any way (to my knowledge)...
> On my machine,
>
> $ journalctl -l | grep apparmor | grep bind |more
>
> shows many lines like
>
> Dec 14 08:00:12 spot audit[922]: AVC apparmor="DENIED"
> operation="mknod" profile="named" name="/etc/bind/db.10.10.2.jbk"
> pid=922 comm="isc-net-0002" requested_mask="c" denied_mask="c"
> fsuid=116 ouid=116
> Dec 14 08:00:12 spot audit[922]: AVC apparmor="DENIED"
> operation="mknod" profile="named" name="/etc/bind/db.home.net.jbk"
> pid=922 comm="isc-net-0003" requested_mask="c" denied_mask="c"
> fsuid=116 ouid=116
>
> /etc/apparmor.d/usr.sbin.named on my machine has
>
>    # /etc/bind should be read-only for bind
>
> and I'm clearly violating that assumption :(
> Rather than fix my bind config I fixed the apparmor config.  If you go
> that way remember to do
>
>    /etc/init.d/apparmor restart
>
> to have the new apparmor rules take effect.
>
> Regards,
> Lee

I deal with selinux rather than apparmor, but the principles and 
pitfalls are the same.

In the long run it's likely to be better to find a suitable 
named-writable directory for your zone files.  Or if your distribution 
doesn't provide one, file a bug report.

With local policy patches, sooner or later an 
upgrade/update/configuration (or staff) change will cause an issue.  By 
Murphy's law, at the most inconvenient time.

Treating zone file directories as read-only on "master" ("primary") 
servers was a reasonable when most zone files were manually edited.  
With UPDATE, and now more important, DNSSEC signing this isn't (and 
shouldn't be) nearly as common.  The advice to put these files in /etc 
is out-of-date.

Any distribution that doesn't provide a security policy and directory 
layout for these configurations is behind the times.  So after checking 
their documentation, file a bug report with them.

However, I'd be surprised if apparmor doesn't provide a suitable 
directory, since slaves' / secondaries' zone files are always 
writable...so it may simply be a documentation/default configuration issue.

Note that /etc/bind usually also contains the configurations files 
(named.conf, named.conf.d, etc).  And those SHOULD be read-only for 
named.  So making all of /etc/bind read-write defeats some of the 
apparmor/selinux protection.

A typical writable location for zone files is /var/named.  (Under 
selinux, zone files are labeled, and whether they can be written is a 
configuration switch.  There should be an apparmor equivalent... )

ISC gave some webinars on "BIND 9 Security" a couple of years ago. 
https://www.isc.org/blogs/bind-security-webinar-series-2021/ .  There's 
a recording of the one on apparmor that may be helpful.  (I haven't 
watched it, but the ISC webinars are usually well done.)


Timothe Litt
ACM Distinguished Engineer
--------------------------
This communication may not represent the ACM or my employer's views,
if any, on the matters discussed.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20250316/5e423f3d/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20250316/5e423f3d/attachment.sig>


More information about the bind-users mailing list