Re: [systemd-devel] Securing bind with systemd methods (was: bind-mount of /run/systemd for chrooted bind9/named)

2023-07-20 Thread Petr Menšík
BIND wans to read ephemeral port ranges to use for outgoing queries. We have such special quirks bind-mounted into bind chroot. But without SELinux-like protection that might not be needed. Consider read-binding /proc/sys/net/ipv4/ip_local_port_range into chroot. We have also /etc/rndc.{conf,k

Re: [systemd-devel] Securing bind with systemd methods (was: bind-mount of /run/systemd for chrooted bind9/named)

2023-07-18 Thread Simon McVittie
On Tue, 18 Jul 2023 at 10:42:49 +0200, Marc Haber wrote: > That would be /usr/lib/x86_64-linux-gnu/ld-linux-x86-64.so.2 on my > system (only output of find /lib /usr/lib -name 'ld-lin*'), and adding > that to ExecPaths doesnt allow my Executable to run. So it must be > something else (possibly in a

Re: [systemd-devel] Securing bind with systemd methods (was: bind-mount of /run/systemd for chrooted bind9/named)

2023-07-18 Thread Marc Haber
On Tue, Jul 18, 2023 at 01:10:16AM +0300, Mantas Mikulėnas wrote: > On Mon, Jul 17, 2023, 15:44 Marc Haber > wrote: > > # /lib is necessary here, or execve will fail without indication for > > # reason - that was a surprise and hard to debug because even strace > > # didnt hint me towards the real

Re: [systemd-devel] Securing bind with systemd methods (was: bind-mount of /run/systemd for chrooted bind9/named)

2023-07-17 Thread Mantas Mikulėnas
On Mon, Jul 17, 2023, 15:44 Marc Haber wrote: > > # /lib is necessary here, or execve will fail without indication for > # reason - that was a surprise and hard to debug because even strace > # didnt hint me towards the real issue > ExecPaths=/usr/sbin/named /usr/sbin/rndc /lib > This one in par

[systemd-devel] Securing bind with systemd methods (was: bind-mount of /run/systemd for chrooted bind9/named)

2023-07-17 Thread Marc Haber
Hi, I'm back. This is my first try at doing a decent systemd unit for bind 9 / named chrooted with named's own features, making the chroot minimal and code-free. Here we go (this has been merged from various plug-in/overrides files, I don't guarantee correct syntax). I have interspersed my commen