On 04/12/2017 06:18 PM, John R Pierce wrote: > On 4/12/2017 3:11 PM, Nicolas Kovacs wrote: >> On my public servers, I usually run BIND for DNS. I see CentOS offers a >> preconfigured (sort of) bind-chroot package. I wonder what's the >> effective benefit of this vs. a "normal" BIND setup without chroot. On >> my Slackware servers, I have a rather Keep-It-Simple approach to all >> things security, e. g. run no unneed services, open only needed ports >> etc. but I don't run the extra mile (and haven't been bitten so far). >> >> Any suggestions? (No flamefest please.) > > > bind went through a rocky stage where there were a LOT of security > holes in it. by running it in a chroot, you limit its ability to be > used as a hacking point of entry. recent versions of bind > (basicially, 9 and newer) are much more secure, so this is less of a > concern. > > But make sure to have SELinux enabled if you do not run it chrooted. I have mine running that way.