Bug 2144069
| Summary: | proc directory in named chroot path - /var/named/chroot | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Amey <abetkike> |
| Component: | bind | Assignee: | Petr Menšík <pemensik> |
| Status: | CLOSED NOTABUG | QA Contact: | rhel-cs-infra-services-qe <rhel-cs-infra-services-qe> |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 8.6 | CC: | sbalasub |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-01-02 12:58:11 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1950714 | ||
| Bug Blocks: | |||
|
Description
Amey
2022-11-18 20:48:02 UTC
/proc actually have to be mounted, or at least part of it. To limit possible privacy or attack vector, I have chosen to bind-mount only one required (pseudo) "file", which is ephemeral port ranges. It is used by bind unless port ranges are specified in config file. Our default configuration does not specify it. It ensures bind will use only ports allowed by SELinux policy. It is not needed if SELinux is disabled, but that is not checked by named-chroot script. Yes, it is expected change. BIND 9.11 started reading /proc/sys/net/ipv4/ip_local_port_range for used port ranges. It will start also without this, but may emit SELinux warnings from time to time. It was requested by bug #1950714, fixed in bind-9.11.26-8 build. I admit it does not mention proc in changelog. It contains instead: - Propagate ephemeral port ranges to chroot (#1950714) Closing with not-a-bug, because I think it is more a question than an issue requiring any change. It is not an error, it is intentional and required. If there is something to fix, please reopen it and explain with more details. Removing /proc/sys/net/ipv4/ip_local_port_range from /etc/named-chroot.files will cause used port ranges reported during startup into the journal to change. With /proc used in chroot: named[4651]: using default UDP/IPv4 port range: [32768, 60999] named[4651]: using default UDP/IPv6 port range: [32768, 60999] If /proc is not used in chroot: named[5198]: using default UDP/IPv4 port range: [1024, 65535] named[5198]: using default UDP/IPv6 port range: [1024, 65535] named-chroot.service has to be stopped before the modification of /etc/named-chroot.files |