Introduction

How to Install and Configure BIND9 DNS Server on FreeBSD 13 is a core administration task for any FreeBSD 13 server operator. FreeBSD 13 ships with the 15.0-RELEASE kernel, ZFS as the default root filesystem, Capsicum capability sandboxing improvements, and an updated ports tree. Unlike Linux distributions, FreeBSD uses rc(8) for service management, pf for packet filtering, and pkg for binary package management — all of which are covered step by step in this guide.

Prerequisites

You will need a FreeBSD 13 server with root shell access and the pkg binary package manager bootstrapped (pkg bootstrap if the system was installed from a minimal image). Confirm the FreeBSD release with freebsd-version -ku. For network-facing services, ensure pf is loaded (kldstat | grep pf) and that your SSH rules are in place before modifying firewall configuration. 2 vCPU, 4 GB RAM, 20 GB disk is sufficient for most services.

Step 1: Update FreeBSD 13 Packages

Always refresh the pkg repository metadata and upgrade installed packages before adding anything new to FreeBSD 13. This ensures you receive the latest binary packages and avoids dependency conflicts. On FreeBSD 13 with ZFS, consider placing service data directories on a dedicated ZFS dataset with compression=lz4 and recordsize tuned for the workload — databases typically benefit from recordsize=8k while file stores prefer recordsize=1M.

pkg update
pkg upgrade -y

Step 2: Install Required Packages

Install the required packages from the FreeBSD binary package repository. pkg(8) resolves dependencies automatically. For packages not in the binary repository, the equivalent port is available in the Ports Collection under /usr/ports. FreeBSD’s rc(8) system supports a rcvar query: run service servicename rcvar to see the exact rc.conf variable name for the service before editing /etc/rc.conf manually.

pkg install -y bind918

Step 3: Enable the Service in rc.conf

FreeBSD does not use systemd. Services are enabled by setting the appropriate variable in /etc/rc.conf. The recommended way is sysrc(8) which edits the file safely without manual text editing. After enabling, start the service with service(8). On FreeBSD 13 with ZFS, consider placing service data directories on a dedicated ZFS dataset with compression=lz4 and recordsize tuned for the workload — databases typically benefit from recordsize=8k while file stores prefer recordsize=1M.

sysrc named_enable="YES"
service named start
service named status

Step 4: Apply the Initial Configuration

Edit the service configuration file. On FreeBSD 13, most third-party package configurations live under /usr/local/etc/. The package may also install a sample configuration — check /usr/local/etc/servicename.conf.sample and copy it before editing. If you need a development version of a package not yet in the binary repository, the Ports Collection at /usr/ports provides make install clean with full compile-time options — run make config first to review the WITH/WITHOUT flags.

cp /usr/local/etc/named.conf.sample /usr/local/etc/named.conf
nano /usr/local/etc/named.conf
service named restart

Step 5: Open the Required Port in pf

FreeBSD 13 uses pf(4) as its primary packet filter. Firewall rules are defined in /etc/pf.conf. Add a pass rule for the required port, reload the ruleset, and verify with pfctl(8). FreeBSD’s rc(8) system supports a rcvar query: run service servicename rcvar to see the exact rc.conf variable name for the service before editing /etc/rc.conf manually.

# Add to /etc/pf.conf:
echo "pass in proto tcp to any port 53" >> /etc/pf.conf
pfctl -f /etc/pf.conf
pfctl -sr | grep 53

Step 6: Consider FreeBSD Jail Isolation

One of FreeBSD 13’s most powerful features is Jails — lightweight OS-level virtualisation that isolates services without the overhead of a VM. Consider running this service inside a Jail using iocage or cbsd for production deployments to limit the blast radius of a compromise. If you need a development version of a package not yet in the binary repository, the Ports Collection at /usr/ports provides make install clean with full compile-time options — run make config first to review the WITH/WITHOUT flags.

pkg install -y iocage
iocage fetch -r 15.0-RELEASE
iocage create -r 15.0-RELEASE -n servicejail ip4_addr="em0|192.168.1.10/24"
iocage start servicejail
iocage console servicejail

Step 7: Monitor Logs

FreeBSD 13 services log to /var/log/ via syslog(3) and newsyslog(8) handles rotation. Use tail -F to follow the log in real time and diagnose startup errors. On FreeBSD 13 with ZFS, consider placing service data directories on a dedicated ZFS dataset with compression=lz4 and recordsize tuned for the workload — databases typically benefit from recordsize=8k while file stores prefer recordsize=1M.

tail -F /var/log/messages
tail -F /var/log/named.log 2>/dev/null || tail -F /var/log/messages

Additional Configuration Options

Once the basic deployment is stable on FreeBSD 13, consider these production-hardening steps: enable periodic(8) maintenance scripts (periodic daily weekly monthly) so the system self-audits; tune newsyslog(8) in /etc/newsyslog.conf to rotate service logs to a remote syslog server using syslogd’s @host syntax; snapshot the service ZFS dataset before each upgrade with zfs snapshot tank/data@pre-upgrade-$(date +%Y%m%d); and review the MAC/Biba or MAC/MLS policy framework if your threat model requires label-based access control beyond standard Unix DAC permissions.

zfs list -t snapshot
periodicconf_enable="YES"  # add to /etc/rc.conf
service periodic onestart daily

Troubleshooting Common Issues

Common issues on FreeBSD 13: if a service fails to start, check /var/log/messages and the rc.conf entry (service servicename rcvar). If a shared library is missing (Shared object "libXXX.so.N" not found), run pkg check -d servicename to identify broken dependencies and reinstall. For pf rule errors, run pfctl -n -f /etc/pf.conf (dry-run parse) before loading. If a Jail cannot reach the network, verify pf_enable="YES" is set before jail_enable and that the pf ruleset passes traffic from the jail’s IP. Use sockstat -4l to confirm a service is listening on the expected port and interface.

sockstat -4l
pfctl -n -f /etc/pf.conf
pkg check -da
cat /var/log/messages | tail -50

Best Practices and Hardening

For production FreeBSD 13 deployments: enable pf with a default-deny policy (block all at the top of pf.conf, then explicit pass rules); run services inside Jails with minimal network access; use GELI disk encryption for data at rest; enable FreeBSD’s built-in security.bsd sysctl hardening knobs (security.bsd.see_other_uids=0, security.bsd.hardlink_check_uid=1); subscribe to the FreeBSD Security Advisory mailing list and apply errata patches promptly with freebsd-update fetch install.

sysctl security.bsd.see_other_uids=0
sysctl security.bsd.see_other_gids=0
sysctl security.bsd.hardlink_check_uid=1
freebsd-update fetch install

Verification

Run this checklist after every deployment on FreeBSD 13: confirm the service is running with service servicename status, verify the listening socket with sockstat -4l | grep :PORT, check the pf ruleset with pfctl -sr, and make an end-to-end client request. Review /var/log/messages for any warnings logged during startup.

service servicename status
sockstat -4l
pfctl -sr
tail /var/log/messages

Conclusion

You have successfully completed how to Install and Configure BIND9 DNS Server on FreeBSD 13 on FreeBSD 13. The service is now registered in rc.conf, managed by rc(8), and protected by your pf ruleset. From here you can jail the service for additional isolation using iocage or cbsd, export its metrics to Prometheus, and include the relevant ZFS datasets in a regular send/receive replication job to a backup host.

As a next step, consider encoding this setup as an Ansible role using the community.general.pkgng and community.general.sysrc modules so it can be applied to an entire FreeBSD fleet. Add a Prometheus node_exporter jail to collect system metrics, and include the service data ZFS dataset in a daily zfs send | ssh backup-host zfs recv job so data is protected from the first moment the service is in production.