Yeah, look it over, but take the zone-transfer restrictions and version-obfuscation stuff with a bit of a grain of salt. Those parts are a little too PHSCSE (Pointy-Haired So-Called Security Expert)-ish for my tastes, verging on Theater. At least they finally got rid of the "bogon" stuff.

Chroot and unprivileged, on the other hand, are _de_rigeur_ for anything facing the Internet directly, as is view separation (or, to be more hardcore, process-instance/listen-on or machine separation) between recursive-resolver and non-recursive/authoritative roles.

If you're slaving, you'd also want to set up TSIG-authentication between masters and slaves. That's not shown in the template.

- Kevin

Dixon, Justin wrote:

>

>

>

>

>

>

>

>

>

>

>

>

>

>

>

>

>

        

Hello BIND users,

I have setup a new Ubuntu 9.04 server with BIND9.

I have looked at a few tutorial and how to’s like this one:

https://help.ubuntu.com/community/BIND9ServerHowto

but would like to get your tips and tricks to secure your BIND servers before putting it into production.

Thanks,

Neosys

Aside from standard OS level hardening that should have already been done, I would recommend looking over the following:

http://www.cymru.com/Documents/secure-bind-template.html

Thanks…

Justin

------------------------------------------------------------------------

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to