Domain Name System (DNS) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ⚠ 2
Comparison against the immediately-prior release (V3R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Severity changes 2
- V-205214 Medium High The DNS server implementation must utilize cryptographic mechanisms to prevent unauthorized modification of DNS zone data.
- V-205215 Medium High The DNS server implementation must utilize cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data stored on the DNS server.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-DNS-000001
- Vuln IDs
-
- V-205157
- V-54853
- Rule IDs
-
- SV-205157r879511_rule
- SV-69099
Checks: C-5424r392387_chk
Review the DNS server configuration and ensure a limit has been defined for the number of outbound zone transfers to only be allowed to the specified secondary name servers. If the DNS server configuration does not explicitly specify which hosts to which it sends zone transfers, this is a finding.
Fix: F-5424r392388_fix
Configure the DNS primary server to explicitly specify which hosts to which it sends zone transfers.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-DNS-000115
- Vuln IDs
-
- V-205158
- V-54777
- Rule IDs
-
- SV-205158r879511_rule
- SV-69023
Checks: C-5425r392390_chk
Review the DNS server configuration and ensure a limit has been defined for the number of inbound dynamic update sessions by defining the finite group of hosts allowed to provide those dynamic updates. If the DNS server configuration does not explicitly specify which hosts from which it accepts dynamic updates, this is a finding.
Fix: F-5425r392391_fix
Configure the DNS primary server to explicitly specify which hosts from which it accepts dynamic updates.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-DNS-000004
- Vuln IDs
-
- V-205159
- V-54781
- Rule IDs
-
- SV-205159r879559_rule
- SV-69027
Checks: C-5426r392393_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components. If the DNS server is not configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components, this is a finding.
Fix: F-5426r392394_fix
Configure the DNS server to generate events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-DNS-000005
- Vuln IDs
-
- V-205160
- V-54783
- Rule IDs
-
- SV-205160r879559_rule
- SV-69029
Checks: C-5427r392396_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access. If the DNS server is not configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access, this is a finding.
Fix: F-5427r392397_fix
Configure the DNS server to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access within all DNS server components.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-DNS-000006
- Vuln IDs
-
- V-205161
- V-54785
- Rule IDs
-
- SV-205161r879563_rule
- SV-69031
Checks: C-5428r392399_chk
Review the DNS system configuration to determine if it is configured to log sufficient information to establish what type of events has occurred on the system. If the logging function is not configured to produce log records with information regarding the type of event, this is a finding.
Fix: F-5428r392400_fix
Configure the DNS server to log events with enough information to determine what type of event has occurred on the system.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-DNS-000007
- Vuln IDs
-
- V-205162
- V-55225
- Rule IDs
-
- SV-205162r879564_rule
- SV-69471
Checks: C-5429r392402_chk
Review the DNS system configuration to determine if it is configured to produce, capture, and store log records that contain information to establish when (date and time) events have occurred on the system. If the logging function is not configured to produce log records with information regarding when the event took place, this is a finding.
Fix: F-5429r392403_fix
Configure the DNS server to produce log records that contain information that establishes when (date and time) events have occurred on the system. Additionally, configure the audit facility of the DNS system to provide information when events have occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-DNS-000008
- Vuln IDs
-
- V-205163
- V-54787
- Rule IDs
-
- SV-205163r879565_rule
- SV-69033
Checks: C-5430r392405_chk
Review the DNS system configuration to determine if it is configured to produce, capture and store log records which contain information to establish where events have occurred on the system. If the logging function is not configured to produce log records with information regarding where the event took place, this is a finding.
Fix: F-5430r392406_fix
Configure the DNS server to produce log records that contain information that establishes where events have occurred. Additionally, configure the audit facility of the DNS system to provide information where events have occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-DNS-000009
- Vuln IDs
-
- V-205164
- V-54789
- Rule IDs
-
- SV-205164r879566_rule
- SV-69035
Checks: C-5431r392408_chk
Review the DNS server configuration to determine if the source of the events is a configurable option within the audit/logging utility and if it is being captured and stored. If the DNS is not configured to capture and store the source of an event, this is a finding.
Fix: F-5431r392409_fix
Configure the DNS server to produce log records which indicate the source of the events. Additionally, configure the audit facility of the DNS system to provide information to establish the source of events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-DNS-000010
- Vuln IDs
-
- V-205165
- V-54791
- Rule IDs
-
- SV-205165r879567_rule
- SV-69037
Checks: C-5432r392411_chk
Review the DNS server configuration to determine if it is configured to produce, capture, and store log records which contain information about success and failure of events on the system. If the logging function is not configured to produce log records with information regarding success and failure of events, this is a finding.
Fix: F-5432r392412_fix
Configure the DNS server to produce log records that contain information about success and failure of events on the system. Additionally, configure the audit facility of the DNS system to provide information to establish the success or failure of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-DNS-000011
- Vuln IDs
-
- V-205166
- V-54793
- Rule IDs
-
- SV-205166r879568_rule
- SV-69039
Checks: C-5433r392414_chk
Review the DNS system configuration to determine if audit records exist without specific user information, when user information is available. If audit records exist without specific user information when user information is available, this is a finding.
Fix: F-5433r392415_fix
Configure the DNS system audit settings to log specific user information whenever user information is available.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-DNS-000012
- Vuln IDs
-
- V-205167
- V-54795
- Rule IDs
-
- SV-205167r879582_rule
- SV-69041
Checks: C-5434r392417_chk
Review the DNS system configuration to determine if audit record content is sent to a centralized audit log repository, either directly by the DNS system or by the underlying O/S. If the DNS system is not configured to support centralized logging and auditing, this is a finding.
Fix: F-5434r392418_fix
Configure the DNS server or the underlying O/S to send audit log content to a centralized logging facility.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-DNS-000014
- Vuln IDs
-
- V-205168
- V-54797
- Rule IDs
-
- SV-205168r879588_rule
- SV-69043
Checks: C-5435r392420_chk
Review the DNS system configuration to ensure the system is configured for incoming traffic only on UDP/53 and TCP/53 and outgoing DNS traffic sent from a random port rather than the DNS software's default port. If the DNS implementation is not configured for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port, this is a finding.
Fix: F-5435r392421_fix
Configure the DNS implementation for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-DNS-000015
- Vuln IDs
-
- V-205169
- V-54799
- Rule IDs
-
- SV-205169r879599_rule
- SV-69045
Checks: C-5436r392423_chk
Review the DNS server implementation configuration to determine if it validates other DNS servers' unique identify, through the use TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from the other DNS servers. If the DNS server does not validate other DNS servers' unique identity, through the use of either TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from those other DNS servers, this is a finding.
Fix: F-5436r392424_fix
Configure the DNS server to verify another DNS server's unique identify, through the use of TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from other DNS servers.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000017
- Vuln IDs
-
- V-205170
- V-54801
- Rule IDs
-
- SV-205170r879613_rule
- SV-69047
Checks: C-5437r392426_chk
Review the DNS server implementation configuration to determine if the DNS server, when using PKI-based authentication (e.g., SIG(0)), enforces authorized access to the corresponding private key. If the DNS server does not enforce authorized access to the private key, this is a finding.
Fix: F-5437r392427_fix
Configure the DNS server to enforce authorized access to the corresponding private key when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000018
- Vuln IDs
-
- V-205171
- V-54803
- Rule IDs
-
- SV-205171r879613_rule
- SV-69049
Checks: C-5438r392429_chk
Review the DNS system to determine ownership of the key file and the account under which the name server software is run. If the key file owner is not the same account as the account under which the name server is run, this is a finding.
Fix: F-5438r392430_fix
Change ownership for the key file to the account under which the name server software is run.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000019
- Vuln IDs
-
- V-205172
- V-54805
- Rule IDs
-
- SV-205172r879613_rule
- SV-69051
Checks: C-5439r392432_chk
Review the DNS system to determine privileges on the key file and the account under which the name server software is run. If the account under which the name server software is run is not the only account which has read/modify permissions to the key file, this is a finding.
Fix: F-5439r392433_fix
Apply permissions to the key file to provide read/modify permissions only to the account under which the name server software is run.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000094
- Vuln IDs
-
- V-205173
- V-54809
- Rule IDs
-
- SV-205173r879613_rule
- SV-69055
Checks: C-5440r392435_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, verify only the private keys corresponding to the ZSK (Zone Signing Key) are located on the server. If the private keys to the KSK are located on the name server that accepts dynamic updates, this is a finding.
Fix: F-5440r392436_fix
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000096
- Vuln IDs
-
- V-205174
- V-54811
- Rule IDs
-
- SV-205174r879613_rule
- SV-69057
Checks: C-5441r392438_chk
Verify the DNS operational procedures and confirm procedures exist to enforce generating signatures using the KSK are performed off-line, using the KSK-private stored off-line or the secure, protected module. If the procedures do not exist or the procedures do not specify to perform the signature generation off-line from the name server, this is a finding.
Fix: F-5441r392439_fix
Create operation documentation to include the safe management of keys and key storage within the DNS implementation. Include in the documentation steps to ensure signature generation using the KSK are done off-line, using the KSK-private stored off-line or the secure, protected module.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SRG-APP-000185-DNS-000021
- Vuln IDs
-
- V-205175
- V-54813
- Rule IDs
-
- SV-205175r879620_rule
- SV-69059
Checks: C-5442r392441_chk
Review the DNS implementation's authentication methods and settings to determine if multifactor authentication is utilized to gain nonlocal access for maintenance and diagnostics. If multifactor authentication is not utilized, this is a finding.
Fix: F-5442r392442_fix
Configure the DNS system to utilize multifactor authentication for nonlocal access for maintenance and diagnostics.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- SRG-APP-000213-DNS-000024
- Vuln IDs
-
- V-205176
- V-54815
- Rule IDs
-
- SV-205176r879633_rule
- SV-69061
Checks: C-5443r392444_chk
Review the zones hosted by the DNS server. Verify each of the zones have been digitally signed. To determine if the zones have been digitally signed, verify the existence of an RRSET for each zone, which will include, at a minimum, an RRType RRSIG (Resource Record Signature) as well as an RRType DNSKEY and RRType NSEC (Next Secure). If the DNS server's zones do not contain these additional RRs along with the regular RRs, this is a finding.
Fix: F-5443r392445_fix
Generate an RRSET for each zone hosted by the DNS server to include an RRSIG, DNSKEY and NSEC for each zone.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- SRG-APP-000214-DNS-000025
- Vuln IDs
-
- V-205177
- V-54817
- Rule IDs
-
- SV-205177r879634_rule
- SV-69063
Checks: C-5444r392447_chk
Review the zones hosted by the DNS server. Every zone should have an RRSET which includes the RRTypes of RRSIG, DNSKEY and NSEC. If a zone has a child, the RRSET should also include the RRType DS (Delegation Signer) RR, which contain the (hash) public key of child zones. If the zones hosted by the DNS server do not have any child domains, this is not a finding. If the zones hosted by the DNS server have child domains, and there is not an RRType DS RR in the zone's RRSET, this is a finding.
Fix: F-5444r392448_fix
Configure each child zone to upload its DS RRset to the parent zone.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- SRG-APP-000214-DNS-000079
- Vuln IDs
-
- V-205178
- V-54819
- Rule IDs
-
- SV-205178r879634_rule
- SV-69065
Checks: C-5445r392450_chk
Review the DNS configuration files. Ensure the validity period for RRSIGs for all zones' delegated children has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs for all zones' delegated children is less than two days or greater than one week, this is a finding.
Fix: F-5445r392451_fix
Configure RRSIGs for all zones' delegated children to be greater than two days and less than one week.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- SRG-APP-000215-DNS-000003
- Vuln IDs
-
- V-205179
- V-54821
- Rule IDs
-
- SV-205179r879635_rule
- SV-69067
Checks: C-5446r392453_chk
Review the DNS server implementation configuration to determine if the DNS server enforces approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices that restrict zone transfers between DNS servers, and dynamic updates from DNS clients to the master name server, to digitally signed traffic. If the DNS server does not enforce approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices, restricting zone transfers between DNS servers and dynamic updates from DNS clients to the master name server to digitally signed traffic, this is a finding.
Fix: F-5446r392454_fix
Configure the DNS server to enforce approved authorizations for controlling the information flow by applying DNSSEC and TSIG signing practices to the DNS implementation.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- SRG-APP-000215-DNS-000026
- Vuln IDs
-
- V-205180
- V-54823
- Rule IDs
-
- SV-205180r879635_rule
- SV-69069
Checks: C-5447r392456_chk
If the system being reviewed is an authoritative server, it must be able to provide records that can be authenticated (DS, RRSIG, etc.). Compare the child zone's hash stored in the child's DS RR to the hash for the child's zone in the parent's zone information. Verify it is the same hash. If the hashes do not match, or the child zone is not digitally signed, this is a finding. If the system is a recursive server, it must be able to pass DNSSEC data and perform DNSSEC validation. If DNSSEC validation capability is not enabled on a recursive DNS server, this is a finding. If the hash for child domains is not reflected in the parent zone and the chain of trust is not verifiable, this is a finding.
Fix: F-5447r392457_fix
Configure a recursive, caching only server with the ability to perform DNSSEC validation. Configure an authoritative name server to sign all zones and to update the entire chain of trust with the signature.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000028
- Vuln IDs
-
- V-205182
- V-54825
- Rule IDs
-
- SV-205182r879636_rule
- SV-69071
Checks: C-5449r392459_chk
Review the DNS server implementation to confirm zone transfers are signing using transaction signing (TSIG) shared key or via SIG(0) asymmetric cryptography public keys. If the DNS server does not ensure integrity of zone transfers by TSIG or SIG(0) signing, this is a finding.
Fix: F-5449r392460_fix
Configure the DNS server with transaction signing (TSIG) or SIG(0).
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000029
- Vuln IDs
-
- V-205183
- V-54827
- Rule IDs
-
- SV-205183r879636_rule
- SV-69073
Checks: C-5450r392462_chk
Review the DNS server configuration to determine if communication sessions for dynamic updates are provided authenticity protection. If communications sessions do not employ authenticity protections, this is a finding.
Fix: F-5450r392463_fix
Configure the DNS server to employ mechanisms to protect the authenticity of communications sessions for dynamic updates.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000030
- Vuln IDs
-
- V-205184
- V-54829
- Rule IDs
-
- SV-205184r879636_rule
- SV-69075
Checks: C-5451r392465_chk
Review the DNS server configuration to ensure all zones are configured to provide resolvers with verification of query response integrity via DNSSEC. If the DNS Server configuration is not configured to provide resolvers with verification of query response integrity via the implementation of DNSSEC, this is a finding.
Fix: F-5451r392466_fix
Configure the DNS server to provide resolvers with verification of query response integrity via DNSSEC.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-DNS-000031
- Vuln IDs
-
- V-205185
- V-54831
- Rule IDs
-
- SV-205185r879640_rule
- SV-69077
Checks: C-5452r392468_chk
Review the DNS server implementation configuration to determine if the DNS server fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the DNS server does not fail to a secure state under these conditions, this is a finding.
Fix: F-5452r392469_fix
Configure the DNS server to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-DNS-000032
- Vuln IDs
-
- V-205186
- V-54833
- Rule IDs
-
- SV-205186r879641_rule
- SV-69079
Checks: C-5453r392471_chk
Review the DNS server implementation configuration to determine if the DNS server preserves any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes. If the DNS server does not preserve the necessary information, this is a finding.
Fix: F-5453r392472_fix
Configure the DNS server to preserve any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-DNS-000033
- Vuln IDs
-
- V-205187
- V-54835
- Rule IDs
-
- SV-205187r879642_rule
- SV-69081
Checks: C-5454r392474_chk
Review the DNS server implementation configuration to determine if the DNS server protects the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest. If the DNS server does not properly protect confidentiality and integrity, this is a finding.
Fix: F-5454r392475_fix
Configure the DNS server to protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-DNS-000034
- Vuln IDs
-
- V-205188
- V-54837
- Rule IDs
-
- SV-205188r879649_rule
- SV-69083
Checks: C-5455r392477_chk
Review the DNS vendor documentation and system configuration to determine if object reuse is protected. If object reuse is not protected, this is a finding.
Fix: F-5455r392478_fix
Configure the DNS system to protect object reuse to prevent unauthorized and unintended information transfer via shared system resources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-DNS-000035
- Vuln IDs
-
- V-205189
- V-54839
- Rule IDs
-
- SV-205189r879650_rule
- SV-69085
Checks: C-5456r392480_chk
Review the DNS server implementation documentation and system settings to determine if the system restricts the ability of users or systems to launch Denial of Service (DoS) attacks against other information systems or networks from the DNS server. If the DNS system is not configured to restrict this ability, this is a finding.
Fix: F-5456r392481_fix
Configure the DNS system to restrict the ability of users or other systems to launch Denial of Service (DoS) attacks from the DNS system.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-APP-000247-DNS-000036
- Vuln IDs
-
- V-205190
- V-54841
- Rule IDs
-
- SV-205190r879651_rule
- SV-69087
Checks: C-5457r392483_chk
Review the DNS server implementation and configuration to determine if excess capacity and bandwidth are managed and redundancy is built into the system to limit the effects of information flooding types of DoS attacks. If excess capacity and bandwidth are not managed, or redundancy is not built into the architecture, this is a finding.
Fix: F-5457r392484_fix
Configure the DNS server to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of DoS attacks.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-DNS-000037
- Vuln IDs
-
- V-205191
- V-54843
- Rule IDs
-
- SV-205191r879652_rule
- SV-69089
Checks: C-5458r392486_chk
Review the DNS server implementation configuration to determine if the DNS server checks the validity of all data inputs except those specifically identified by the organization. If the DNS server does not check the validity of all data inputs, this is a finding.
Fix: F-5458r392487_fix
Configure the DNS server to check the validity of all data inputs except those specifically identified by the organization.
- RMF Control
- SI-13
- Severity
- M
- CCI
- CCI-001328
- Version
- SRG-APP-000268-DNS-000039
- Vuln IDs
-
- V-205192
- V-54969
- Rule IDs
-
- SV-205192r879657_rule
- SV-69215
Checks: C-5459r392489_chk
Review the DNS server implementation configuration to determine if the DNS server activates a notification to the system administrator when a component failure is detected. If the DNS server does not activate a notification to the system administrator when a failure is detected, this is a finding.
Fix: F-5459r392490_fix
Configure the DNS server so that when a component failure is detected, the server activates a notification to the system administrator.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- SRG-APP-000275-DNS-000040
- Vuln IDs
-
- V-205193
- V-54845
- Rule IDs
-
- SV-205193r879661_rule
- SV-69091
Checks: C-5460r392492_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures. If the DNS server is not configured to generate such audit records, this is a finding.
Fix: F-5460r392493_fix
Configure the DNS server to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002201
- Version
- SRG-APP-000333-DNS-000104
- Vuln IDs
-
- V-205194
- V-54847
- Rule IDs
-
- SV-205194r879710_rule
- SV-69093
Checks: C-5461r392495_chk
Review the DNS configuration files. Verify the DNS name server is explicitly configured to refuse queries asking for its version information. If the name server is not configured to explicitly refuse queries asking for its version information, this is a finding.
Fix: F-5461r392496_fix
Configure the name server to refuse queries for its version information.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002201
- Version
- SRG-APP-000333-DNS-000107
- Vuln IDs
-
- V-205195
- V-54849
- Rule IDs
-
- SV-205195r879710_rule
- SV-69095
Checks: C-5462r392498_chk
Review the DNS configuration files. Verify there are not any HINFO, RP, TXT, or LOC RR type RRs in the configuration. If there are any HINFO, RP, TXT or LOC RR type RRs in the configuration, this is a finding.
Fix: F-5462r392499_fix
Configure the DNS configuration to not include any HINFO, RP, TXT, or LOC RR type RRs.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-001901
- Version
- SRG-APP-000347-DNS-000041
- Vuln IDs
-
- V-205196
- V-54971
- Rule IDs
-
- SV-205196r879724_rule
- SV-69217
Checks: C-5463r392501_chk
Review the DNS server implementation configuration to determine if the DNS server strongly binds the identity of the DNS server with the DNS information. Examples include enabling DNSSEC and enabling TSIG or SIG(0). If the DNS server does not strongly bind the identity of the DNS server with the DNS information, this is a finding.
Fix: F-5463r392502_fix
Configure the DNS server to strongly bind the identity of the DNS server with the DNS information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000348-DNS-000042
- Vuln IDs
-
- V-205197
- V-54973
- Rule IDs
-
- SV-205197r879725_rule
- SV-69219
Checks: C-5464r392504_chk
Review the DNS server implementation configuration to determine if the DNS server provides the means for authorized individuals to determine the identity of the source of the DNS server-provided information. If the DNS server does not provide such means, this is a finding.
Fix: F-5464r392505_fix
Configure the DNS server to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-001904
- Version
- SRG-APP-000349-DNS-000043
- Vuln IDs
-
- V-205198
- V-54975
- Rule IDs
-
- SV-205198r879726_rule
- SV-69221
Checks: C-5465r392507_chk
Review the DNS server implementation configuration to determine if the DNS server validates the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer). If the DNS server does not validate the binding of the other DNS server's identity to the DNS information, this is a finding.
Fix: F-5465r392508_fix
Configure the DNS server to validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000350-DNS-000044
- Vuln IDs
-
- V-205199
- V-54977
- Rule IDs
-
- SV-205199r879727_rule
- SV-69223
Checks: C-5466r392510_chk
Review the DNS server implementation configuration to determine if the DNS server, when it encounters an event or an error when validating the binding of another DNS server's identity to the DNS information, is configured to log the event and send notification to the DNS administrator. If the DNS server does not log the event and send notification to the DNS administrator in the event of such a validation error, this is a finding.
Fix: F-5466r392511_fix
Configure the DNS server to log the event and send notification to the DNS administrator in the event an error occurs when validating the binding of another DNS server's identity to the DNS information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000383-DNS-000047
- Vuln IDs
-
- V-205201
- V-54855
- Rule IDs
-
- SV-205201r879756_rule
- SV-69101
Checks: C-5468r392516_chk
Review the DNS server configuration to determine if recursion is being performed on an authoritative name server. If an authoritative name server also performs recursion, this is a finding.
Fix: F-5468r392517_fix
Ensure the DNS server is not defined as both authoritative and recursive.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-DNS-000048
- Vuln IDs
-
- V-205202
- V-54857
- Rule IDs
-
- SV-205202r879763_rule
- SV-69103
Checks: C-5469r392519_chk
Review the DNS server implementation configuration to determine if the DNS server requires devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request. If the DNS server does not require devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request, this is a finding. Note that the requirement should be inherently met if DNSSEC and TSIG/SIG(0) are enabled.
Fix: F-5469r392520_fix
Configure the DNS server to require devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request. Note that the requirement should be inherently met if DNSSEC and TSIG/SIG(0) are enabled.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-APP-000394-DNS-000049
- Vuln IDs
-
- V-205203
- V-54861
- Rule IDs
-
- SV-205203r879767_rule
- SV-69107
Checks: C-5470r392522_chk
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Fix: F-5470r392523_fix
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-DNS-000050
- Vuln IDs
-
- V-205204
- V-54863
- Rule IDs
-
- SV-205204r879768_rule
- SV-69109
Checks: C-5471r392525_chk
Review the DNS server implementation configuration to determine if the DNS server authenticates another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based. If the DNS server does not authenticate another DNS server before establishing a connection, this is a finding.
Fix: F-5471r392526_fix
Configure the DNS server to authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-APP-000401-DNS-000051
- Vuln IDs
-
- V-205205
- V-54865
- Rule IDs
-
- SV-205205r879774_rule
- SV-69111
Checks: C-5472r392528_chk
Review the DNS server implementation configuration to determine if the DNS server, for PKI-based authentication (i.e., SIG(0)), implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the DNS server does not implement such a cache of revocation data, this is a finding.
Fix: F-5472r392529_fix
Configure the DNS server, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000420-DNS-000053
- Vuln IDs
-
- V-205206
- V-54867
- Rule IDs
-
- SV-205206r879791_rule
- SV-69113
Checks: C-5473r392531_chk
Review the DNS server implementation configuration to determine if the DNS server provides data origin artifacts for internal name/address resolution queries. If the DNS server does not provide these data origin artifacts, this is a finding.
Fix: F-5473r392532_fix
Configure the DNS server to provide data origin artifacts for internal name/address resolution queries.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-002464
- Version
- SRG-APP-000421-DNS-000054
- Vuln IDs
-
- V-205207
- V-54869
- Rule IDs
-
- SV-205207r879792_rule
- SV-69115
Checks: C-5474r392534_chk
Review the DNS server implementation configuration to determine if the DNS server provides data integrity protection artifacts for internal name/address resolution queries. If the DNS server does not provide these artifacts, this is a finding.
Fix: F-5474r392535_fix
Configure the DNS server to provide data integrity protection artifacts for internal name/address resolution queries.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-002462
- Version
- SRG-APP-000422-DNS-000055
- Vuln IDs
-
- V-205208
- V-54871
- Rule IDs
-
- SV-205208r879793_rule
- SV-69117
Checks: C-5475r392537_chk
Review the DNS server implementation configuration to determine if the DNS server provides additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries. If the DNS server does not provide such integrity artifacts, this is a finding.
Fix: F-5475r392538_fix
Configure the DNS server to provide additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002465
- Version
- SRG-APP-000423-DNS-000056
- Vuln IDs
-
- V-205209
- V-54873
- Rule IDs
-
- SV-205209r879794_rule
- SV-69119
Checks: C-5476r392540_chk
Review the DNS server implementation configuration to determine if the DNS server requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data origin authentication verification on the responses, this is a finding.
Fix: F-5476r392541_fix
Configure the DNS server to request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002466
- Version
- SRG-APP-000424-DNS-000057
- Vuln IDs
-
- V-205210
- V-54875
- Rule IDs
-
- SV-205210r879795_rule
- SV-69121
Checks: C-5477r392543_chk
Review the DNS server implementation configuration to determine if the DNS server requests data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data integrity verification on the responses, this is a finding.
Fix: F-5477r392544_fix
Configure the DNS server to request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002467
- Version
- SRG-APP-000425-DNS-000058
- Vuln IDs
-
- V-205211
- V-54877
- Rule IDs
-
- SV-205211r879796_rule
- SV-69123
Checks: C-5478r392546_chk
Review the DNS server implementation configuration to determine if the DNS server performs data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data integrity verification on the responses, this is a finding.
Fix: F-5478r392547_fix
Configure the DNS server to perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002468
- Version
- SRG-APP-000426-DNS-000059
- Vuln IDs
-
- V-205212
- V-54885
- Rule IDs
-
- SV-205212r879797_rule
- SV-69131
Checks: C-5479r392549_chk
Review the DNS server implementation configuration to determine if the DNS server performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data origin verification authentication on the responses, this is a finding.
Fix: F-5479r392550_fix
Configure the DNS server to perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-DNS-000060
- Vuln IDs
-
- V-205213
- V-54887
- Rule IDs
-
- SV-205213r879798_rule
- SV-69133
Checks: C-5480r392552_chk
If the DNS server is using SIG(0), review the DNS server implementation configuration to determine if the DNS server only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions. If the DNS server allows the use of other certificate authorities, this is a finding.
Fix: F-5480r392553_fix
Configure the DNS server to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002475
- Version
- SRG-APP-000428-DNS-000061
- Vuln IDs
-
- V-205214
- V-55227
- Rule IDs
-
- SV-205214r954226_rule
- SV-69473
Checks: C-5481r392555_chk
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized modification of zone data. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized modification, this is a finding.
Fix: F-5481r392556_fix
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized modification of zone data.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-002476
- Version
- SRG-APP-000429-DNS-000062
- Vuln IDs
-
- V-205215
- V-54889
- Rule IDs
-
- SV-205215r954227_rule
- SV-69135
Checks: C-5482r392558_chk
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized disclosure, this is a finding.
Fix: F-5482r392559_fix
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-DNS-000063
- Vuln IDs
-
- V-205216
- V-54891
- Rule IDs
-
- SV-205216r917686_rule
- SV-69137
Checks: C-5483r392561_chk
Review the DNS implementation configuration to determine if the DNS server protects the integrity of transmitted information. If the DNS server does not protect the integrity of transmitted information, this is a finding.
Fix: F-5483r392562_fix
Configure the DNS server to protect the integrity of transmitted information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- SRG-APP-000440-DNS-000065
- Vuln IDs
-
- V-205217
- V-54895
- Rule IDs
-
- SV-205217r879811_rule
- SV-69141
Checks: C-5484r392564_chk
Review the DNS server implementation configuration to determine if the DNS server implements cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS). If the DNS server does not implement such cryptographic mechanisms, this is a finding.
Fix: F-5484r392565_fix
Configure the DNS server to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution Systems (PDS).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-DNS-000066
- Vuln IDs
-
- V-205218
- V-54897
- Rule IDs
-
- SV-205218r879812_rule
- SV-69143
Checks: C-5485r392567_chk
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during preparation for transmission. If the DNS server does not maintain the integrity during preparation for transmission, this is a finding.
Fix: F-5485r392568_fix
Configure the DNS server to maintain the integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-DNS-000067
- Vuln IDs
-
- V-205219
- V-54899
- Rule IDs
-
- SV-205219r879813_rule
- SV-69145
Checks: C-5486r392570_chk
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during reception. If the DNS server does not maintain integrity during reception, this is a finding.
Fix: F-5486r392571_fix
Configure the DNS server to maintain the integrity of information during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-DNS-000068
- Vuln IDs
-
- V-205220
- V-54901
- Rule IDs
-
- SV-205220r879818_rule
- SV-69147
Checks: C-5487r392573_chk
Review the DNS server implementation configuration to determine if the DNS server behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the DNS server does not behave in such a manner, this is a finding.
Fix: F-5487r392574_fix
Configure the DNS server to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-17
- Severity
- M
- CCI
- CCI-002775
- Version
- SRG-APP-000451-DNS-000069
- Vuln IDs
-
- V-205221
- V-54903
- Rule IDs
-
- SV-205221r879822_rule
- SV-69149
Checks: C-5488r392576_chk
Review the DNS server implementation operating documentation to determine if procedures exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality. If procedures do not exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality, this is a finding.
Fix: F-5488r392577_fix
Develop internal procedures to ensure a secondary name server to the master in the event the master DNS name server permanently loses functionality.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-DNS-000072
- Vuln IDs
-
- V-205222
- V-54905
- Rule IDs
-
- SV-205222r879844_rule
- SV-69151
Checks: C-5489r392579_chk
Review the DNS server implementation configuration to determine if the DNS server performs verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days. If the DNS server does not perform this verification when needed, this is a finding.
Fix: F-5489r392580_fix
Configure the DNS server to perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-DNS-000073
- Vuln IDs
-
- V-205223
- V-54907
- Rule IDs
-
- SV-205223r879845_rule
- SV-69153
Checks: C-5490r392582_chk
Review the DNS server implementation configuration to determine if the DNS server logs the event and notifies the system administrator when anomalies in the operation of the signed zone transfers are discovered. If the DNS server implementation does not log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered, this is a finding.
Fix: F-5490r392583_fix
Configure the DNS server to log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DNS-000074
- Vuln IDs
-
- V-205224
- V-54909
- Rule IDs
-
- SV-205224r879875_rule
- SV-69155
Checks: C-5491r392585_chk
Review the DNS system to determine if it is configured to log success and failure of the start and stop of the name server service or daemon. If the DNS system is not configured to log these events, this is a finding.
Fix: F-5491r392586_fix
Configure the DNS system to log success and failure of the start and stop of the name service or daemon.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DNS-000082
- Vuln IDs
-
- V-205225
- V-54911
- Rule IDs
-
- SV-205225r879875_rule
- SV-69157
Checks: C-5492r392588_chk
Review the DNS system to determine if it is configured to log, at a minimum, success and failure of zone transfers dynamic updates, and start and stop of the name server service or daemon. If the DNS is not configured to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon, this is a finding.
Fix: F-5492r392589_fix
Configure the DNS system to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-DNS-000075
- Vuln IDs
-
- V-205226
- V-54915
- Rule IDs
-
- SV-205226r879885_rule
- SV-69161
Checks: C-5493r392591_chk
Review the DNS implementation and configuration files to ensure FIPS-validated cryptography is being used when provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information that requires confidentiality. If the DNS configuration does not use FIPS-validated cryptography, this is a finding.
Fix: F-5493r392592_fix
Configure the DNS implementation to use NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000077
- Vuln IDs
-
- V-205227
- V-54917
- Rule IDs
-
- SV-205227r879887_rule
- SV-69163
Checks: C-5494r392594_chk
Check the DNS configuration files and operational documentation. If the zone's RRs have been signed with NSEC3, the operational procedures should stipulate to change the salt value every time the zone is completely re-signed. If the operational procedures do not specify to change the salt value for RRs signed with NSEC3 every time the zone is completely re-signed, this is a finding.
Fix: F-5494r392595_fix
Include instructions in the DNS operational procedures to change the salt value every time RRs signed by NSEC3 have been re-signed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000078
- Vuln IDs
-
- V-205228
- V-54919
- Rule IDs
-
- SV-205228r879887_rule
- SV-69165
Checks: C-5495r392597_chk
Review the DNS configuration files. Ensure the validity period for RRSIGs has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs covering a zone's DNSKEY RRSet is less than two days or greater than one week, this is a finding.
Fix: F-5495r392598_fix
Configure RRSIGs covering each zone's DNSKEY RRSet to be greater than two days and less than one week.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000084
- Vuln IDs
-
- V-205229
- V-54921
- Rule IDs
-
- SV-205229r879887_rule
- SV-69167
Checks: C-5496r392600_chk
Review the zone file's configuration for internal zones and confirm the NSEC3 RR option is used to provide authenticated denial of existence. If the NSEC3 RR option is not used for internal zones, this is a finding.
Fix: F-5496r392601_fix
Configure all internal zones to use the NSEC3 RR option for authenticated denial of existence.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000085
- Vuln IDs
-
- V-205230
- V-54923
- Rule IDs
-
- SV-205230r879887_rule
- SV-69169
Checks: C-5497r392603_chk
Review the zone file's configuration and confirm that each NS record points to an active name server authoritative for the domain. If this is not the case, this is a finding.
Fix: F-5497r392604_fix
Remove any NS record in a zone file that does not point to an active name server authoritative for the domain specified in that record.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000086
- Vuln IDs
-
- V-205231
- V-54925
- Rule IDs
-
- SV-205231r879887_rule
- SV-69171
Checks: C-5498r392606_chk
Review the DNS implementation and documentation and confirm the permissions on the key files, which were generated by the dnssec-keygen program and copied to the name server, are only accessible to the server administrator or have been deleted. Verify all paper copies of the key files have been destroyed. If the key files have been deleted and all paper copies have been destroyed, this is not a finding. If the key files have been deleted but the paper copies have not been destroyed, this is a finding. If the key files still exist, and the permissions on the key files have not been configured to only allow the server administrator account access, this is a finding.
Fix: F-5498r392607_fix
Configure permissions on the key files to only give access to the server administrator, or delete the key files altogether. Destroy all paper copies of the key files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000087
- Vuln IDs
-
- V-205232
- V-54927
- Rule IDs
-
- SV-205232r879887_rule
- SV-69173
Checks: C-5499r392609_chk
Review the DNS configuration files to determine all of the NS records for each zone. Based upon the NS records for each zone, determine location of each of the name servers. Verify all authoritative name servers are located on different network segments. If two authoritative name servers are found on the same network segment, and one of those two is hidden, this is not a finding. If any authoritative name servers are located on the same network segment as another authoritative name server, this is a finding.
Fix: F-5499r392610_fix
Locate all visible (non-hidden) name servers to be on different network segments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000088
- Vuln IDs
-
- V-205233
- V-54929
- Rule IDs
-
- SV-205233r879887_rule
- SV-69175
Checks: C-5500r392612_chk
Review the DNS configuration for each zone hosted by the authoritative name server. Determine all authoritative name servers for each zone. Review the serial number in the SOA RDATA, on each authoritative name server for each zone, and ensure the serial number is the same on each secondary name server as on the primary name server. If any secondary name server for a zone has a serial number in the SOA RDATA that is different from the primary name server, this is a finding.
Fix: F-5500r392613_fix
Troubleshoot and fix any problems with zone transfers completing successfully between the primary name server and all secondary name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000089
- Vuln IDs
-
- V-205234
- V-54931
- Rule IDs
-
- SV-205234r879887_rule
- SV-69177
Checks: C-5501r392615_chk
Check the DNS configuration to ensure DNSSEC Resource Records has been enabled. If the name server is not configured with DNSSEC enabled, this is a finding.
Fix: F-5501r392616_fix
Configure the name server with DNSSEC enabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000090
- Vuln IDs
-
- V-205235
- V-54979
- Rule IDs
-
- SV-205235r879887_rule
- SV-69225
Checks: C-5502r392618_chk
Review the DNS implementation and documentation. Confirm the signature algorithm used for DNSSEC-enabled zones is FIPS-compatible. If the signature algorithm used for DNSSEC-enabled zones is not FIPS-compatible, this is a finding.
Fix: F-5502r392619_fix
Regenerate signatures for all DNSSEC-enabled zones with FIPS-compatible algorithms.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000091
- Vuln IDs
-
- V-205236
- V-54933
- Rule IDs
-
- SV-205236r879887_rule
- SV-69179
Checks: C-5503r392621_chk
Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NAT'd through the perimeter firewall. Verify the RRs in the internal name server are not also listed in the external name server. If there are RRs in the internal name server for hosts also listed in the external name server, and the IP to which it resolves is on the external network, this is a finding. Verify the RRs in the external name server are not also listed in the internal name server. If there are RRs in the external name server for hosts also listed in the internal name server, and the IP to which it resolves is on the internal network, this is a finding.
Fix: F-5503r392622_fix
Remove any RRs listed in the internal name server configuration which resolve for external hosts and remove any RRs listed in the external name server configuration which resolve to internal hosts. For hosts intended to be accessed by both internal and external clients, configure unique IP addresses in each of the internal and external name servers, respective to their location. The perimeter firewall, or other routing device, should handle the Network Address Translation to the true IP address of the destination.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000092
- Vuln IDs
-
- V-205237
- V-54935
- Rule IDs
-
- SV-205237r879887_rule
- SV-69181
Checks: C-5504r392624_chk
Review the DNS implementation and ensure the external DNS name servers are not reachable by internal resolvers. If the external DNS name servers can be reached by internal resolvers, this is a finding.
Fix: F-5504r392625_fix
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000093
- Vuln IDs
-
- V-205238
- V-54937
- Rule IDs
-
- SV-205238r879887_rule
- SV-69183
Checks: C-5505r392627_chk
Review the DNS implementation and ensure internal DNS name servers are not reachable by external resolvers. If the internal DNS name servers can be reached by external resolvers, this is a finding.
Fix: F-5505r392628_fix
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000095
- Vuln IDs
-
- V-205239
- V-54939
- Rule IDs
-
- SV-205239r879887_rule
- SV-69185
Checks: C-5506r392630_chk
Review the DNS configuration files. Verify a configuration is in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests. If a configuration is not in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests, this is a finding.
Fix: F-5506r392631_fix
Configure the authoritative name server to specify which secondary name servers from which it will receive zone transfer requests.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000097
- Vuln IDs
-
- V-205240
- V-54941
- Rule IDs
-
- SV-205240r879887_rule
- SV-69187
Checks: C-5507r392633_chk
Review DNS implementation documentation to determine whether the DNS system has capabilities compliant to IETF RFC-1034 (Domain Names-Concepts and Facilities), RFC-1035 (Domain Names-Implementation and Specification), and subsequent RFCs. Systems using DNSSEC (DNS Security Extensions) should be compliant to RFC-4033 (DNS Security Introduction and Requirements), RFC-4024 (Resource Records for the DNS Security Extensions), RFC-4035 (Protocol Modifications for the DNS security Extensions), RFC-5155 (DNS Security (DNSSEC) Hashed Authenticated Denial of Existence) and related RFCs. A DNS implementation may also be found non-compliant by empirical analysis, i.e., by experimentally querying and examine the answer. For example, a DNS implementation may not answer a query for the 'NS' resource record type with a CNAME reply. If the implementation does not comply to the IETF DNS RFCs, this is a finding.
Fix: F-5507r392634_fix
Configure the DNS implementation to be compliant to the IETF specifications for DNS. Protect DNS transactions, such as update of DNS name resolution data and data replication that involve DNS nodes within an enterprise's control. The transactions should be protected using hash-based message authentication codes based on shared secrets, as outlined in Internet Engineering Task Force's (IETF) Transaction Signature (TSIG) specification. Protect the ubiquitous DNS query/response transaction that could involve any DNS node in the global Internet using digital signatures based on asymmetric cryptography, as outlined in IETF's Domain Name System Security Extension (DNSSEC) specification.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000099
- Vuln IDs
-
- V-205241
- V-54943
- Rule IDs
-
- SV-205241r879887_rule
- SV-69189
Checks: C-5508r392636_chk
Review the DNS configuration and access control structure to determine if DACs are in place to limit the propagation of rights as determined by the organization. Access control lists for user permissions, as well as zone transfers and updates, must be present. If they are not present, this is a finding.
Fix: F-5508r392637_fix
Configure the DNS implementation to eliminate access rights propagation.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000101
- Vuln IDs
-
- V-205242
- V-54945
- Rule IDs
-
- SV-205242r879887_rule
- SV-69191
Checks: C-5509r392639_chk
Review the zone configuration with the DNS administrator and verify whether the zone has records on both the internal and external networks. If the zone is split, verify there is a separate external name server to handle the host records for external address space and an internal name server to handle the host records for internal address space. If there are split zones and there are not internal and external roles to protect private address space, this is a finding.
Fix: F-5509r392640_fix
Configure the DNS server to separate internal and external roles to protect private address space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000102
- Vuln IDs
-
- V-205243
- V-54947
- Rule IDs
-
- SV-205243r879887_rule
- SV-69193
Checks: C-5510r392642_chk
Review the entries within the root hints file and validate that the entries are correct. G and H root servers are required on the NIPRNet, as a minimum. All default settings on servers must be verified and corrected if necessary. If valid root name servers are not configured, this is a finding.
Fix: F-5510r392643_fix
Configure the DNS implementation to use valid root name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000103
- Vuln IDs
-
- V-205244
- V-54949
- Rule IDs
-
- SV-205244r879887_rule
- SV-69195
Checks: C-5511r392645_chk
Review the DNS implementation to determine the name server software version. If the installed name server software version is not the latest production version, this is a finding.
Fix: F-5511r392646_fix
Update the installed name server software with the latest production version.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000105
- Vuln IDs
-
- V-205245
- V-54951
- Rule IDs
-
- SV-205245r879887_rule
- SV-69197
Checks: C-5512r392648_chk
Review the account under which the DNS software is running and determine the permissions that account has been assigned. If the account under which the DNS software is running has not been restricted to the least privileged permissions required for the purpose of running the software, this is a finding.
Fix: F-5512r392649_fix
Configured the permissions of the account being used to run the DNS software so that it has the least privileges required under which to run the DNS software.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000108
- Vuln IDs
-
- V-205246
- V-54953
- Rule IDs
-
- SV-205246r879887_rule
- SV-69199
Checks: C-5513r392651_chk
Check the DNS documentation to determine if a hidden master authoritative name server is being used. If a hidden master authoritative name server is being used, check the NS records for all zones for which that hidden name server is authoritative and confirm there is not any NS record for that hidden name server. If any zone for which a hidden name server is authoritative has an NS record for that hidden name server, this is a finding. If the DNS implementation does not include any hidden name servers, this is not applicable.
Fix: F-5513r392652_fix
Remove, from all zones' configuration files, any NS RRs for hidden name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000109
- Vuln IDs
-
- V-205247
- V-54955
- Rule IDs
-
- SV-205247r879887_rule
- SV-69201
Checks: C-5514r392654_chk
Review the name server configuration. Verify the server is configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG. If the DNS server is not configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG, this is a finding.
Fix: F-5514r392655_fix
Configure the DNS name server to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000110
- Vuln IDs
-
- V-205248
- V-54957
- Rule IDs
-
- SV-205248r879887_rule
- SV-69203
Checks: C-5515r392657_chk
Review the DNS configuration. Determine if a static port is being used to send outgoing DNS messages or whether it is configured to use a random port. If the DNS configuration specifies a static port to be used for outgoing DNS messages rather than a random port, this is a finding.
Fix: F-5515r392658_fix
Configure the DNS server to use a random port for outgoing DNS messages.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000111
- Vuln IDs
-
- V-205249
- V-54959
- Rule IDs
-
- SV-205249r879887_rule
- SV-69205
Checks: C-5516r392660_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, ensure the private key corresponding to the ZSK alone is protected with directory/file-level access control list-based or cryptography-based protections. If the private key corresponding to the ZSK alone is not protected with directory/file-level access control list-based or cryptography-based protections, this is a finding.
Fix: F-5516r392661_fix
Apply permissions to the private key corresponding to the ZSK alone with read/modify permissions for the account under which the name server software is run.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000112
- Vuln IDs
-
- V-205250
- V-54961
- Rule IDs
-
- SV-205250r879887_rule
- SV-69207
Checks: C-5517r392663_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are not accepted, verify the private keys corresponding to both the ZSK (Zone Signing Key) and KSK (Key Signing Key) are not located on the name server. If the private keys to the ZSK and/or the KSK are located on the name server, this is a finding.
Fix: F-5517r392664_fix
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000113
- Vuln IDs
-
- V-205251
- V-54963
- Rule IDs
-
- SV-205251r879887_rule
- SV-69209
Checks: C-5518r392666_chk
Review the zone files and confirm with the DNS administrator that the hosts defined in the zone files do not resolve to hosts in another zone with its fully qualified domain name. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated. If resource records are maintained that resolve to a fully qualified domain name in another zone, and the usage is not for resource records resolving to hosts that are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a documented and approved mission need, this is a finding.
Fix: F-5518r392667_fix
Remove any resource records in a zone file if the resource record resolves to a fully qualified domain name residing in another zone.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000114
- Vuln IDs
-
- V-205252
- V-54965
- Rule IDs
-
- SV-205252r879887_rule
- SV-69211
Checks: C-5519r392669_chk
Review the DNS server's hosted zones and respective records. Within the zone statement will be a file option that will display the name of the zone file. The record type column will display CNAME. This is usually the third or fourth field in a record depending on whether the TTL value is utilized. Without a TTL value, the CNAME type will be in the third field; otherwise, it will display as the fourth field. Review the zone files and the DNS zone record documentation to confirm that there are no CNAME records older than 6 months. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated (AO approval of use of a commercial cloud offering would satisfy this requirement). If there are zone-spanning CNAME records older than 6 months and the CNAME records resolves to anything other than fully qualified domain name for glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a AO-approved and documented mission need, this is a finding.
Fix: F-5519r392670_fix
Remove any zone-spanning CNAME records that have been active for more than six months.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000500
- Vuln IDs
-
- V-205253
- V-55229
- Rule IDs
-
- SV-205253r879887_rule
- SV-69475
Checks: C-5520r392672_chk
Review the DNS server implementation configuration to determine if the DNS server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the DNS server is not configured in accordance with these settings, this is a finding.
Fix: F-5520r392673_fix
Configure the DNS server to be in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000076
- Vuln IDs
-
- V-220316
- V-54807
- Rule IDs
-
- SV-220316r918504_rule
- SV-69053
Checks: C-22031r392381_chk
Review the DNS implementation. Verify that each pair of communicating hosts has a unique TSIG key (i.e., a separate key for each secondary name server to authenticate transactions with the primary name server, etc.) If a unique TSIG key has not been generated for each pair of communicating hosts, this is a finding.
Fix: F-22023r392382_fix
Regenerate a unique TSIG key for each pair of communicating hosts within the DNS architecture.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000218-DNS-000027
- Vuln IDs
-
- V-220317
- V-54967
- Rule IDs
-
- SV-220317r879887_rule
- SV-69213
Checks: C-22032r392384_chk
Review the NS records for each zone hosted and confirm that each authoritative name server is located at a different physical location than the remaining name servers. If the master, or primary, authoritative name server is configured to be "hidden", it will not have an NS record. One other name server may be at the same physical location as the hidden name server. If all name servers, for which NS records are listed, are not physically at different locations, this is a finding.
Fix: F-22024r392385_fix
Physically move name servers so that they are geographically at different locations. If moving a name server is not feasible, one of the co-located name servers could be reconfigured to be hidden.