Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the DNS server configuration and ensure a limit has been defined for the number of outbound zone transfers to only be allowed to the specified secondary name servers. If the DNS server configuration does not explicitly specify which hosts to which it sends zone transfers, this is a finding.
Configure the DNS primary server to explicitly specify which hosts to which it sends zone transfers.
Review the DNS server configuration and ensure a limit has been defined for the number of inbound dynamic update sessions by defining the finite group of hosts allowed to provide those dynamic updates. If the DNS server configuration does not explicitly specify which hosts from which it accepts dynamic updates, this is a finding.
Configure the DNS primary server to explicitly specify which hosts from which it accepts dynamic updates.
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components. If the DNS server is not configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components, this is a finding.
Configure the DNS server to generate events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components.
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access. If the DNS server is not configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access, this is a finding.
Configure the DNS server to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access within all DNS server components.
Review the DNS system configuration to determine if it is configured to log sufficient information to establish what type of events has occurred on the system. If the logging function is not configured to produce log records with information regarding the type of event, this is a finding.
Configure the DNS server to log events with enough information to determine what type of event has occurred on the system.
Review the DNS system configuration to determine if it is configured to produce, capture, and store log records that contain information to establish when (date and time) events have occurred on the system. If the logging function is not configured to produce log records with information regarding when the event took place, this is a finding.
Configure the DNS server to produce log records that contain information that establishes when (date and time) events have occurred on the system. Additionally, configure the audit facility of the DNS system to provide information when events have occurred.
Review the DNS system configuration to determine if it is configured to produce, capture and store log records which contain information to establish where events have occurred on the system. If the logging function is not configured to produce log records with information regarding where the event took place, this is a finding.
Configure the DNS server to produce log records that contain information that establishes where events have occurred. Additionally, configure the audit facility of the DNS system to provide information where events have occurred.
Review the DNS server configuration to determine if the source of the events is a configurable option within the audit/logging utility and if it is being captured and stored. If the DNS is not configured to capture and store the source of an event, this is a finding.
Configure the DNS server to produce log records which indicate the source of the events. Additionally, configure the audit facility of the DNS system to provide information to establish the source of events.
Review the DNS server configuration to determine if it is configured to produce, capture, and store log records which contain information about success and failure of events on the system. If the logging function is not configured to produce log records with information regarding success and failure of events, this is a finding.
Configure the DNS server to produce log records that contain information about success and failure of events on the system. Additionally, configure the audit facility of the DNS system to provide information to establish the success or failure of the event.
Review the DNS system configuration to determine if audit records exist without specific user information, when user information is available. If audit records exist without specific user information when user information is available, this is a finding.
Configure the DNS system audit settings to log specific user information whenever user information is available.
Review the DNS system configuration to determine if audit record content is sent to a centralized audit log repository, either directly by the DNS system or by the underlying O/S. If the DNS system is not configured to support centralized logging and auditing, this is a finding.
Configure the DNS server or the underlying O/S to send audit log content to a centralized logging facility.
Review the DNS system configuration to ensure the system is configured for incoming traffic only on UDP/53 and TCP/53 and outgoing DNS traffic sent from a random port rather than the DNS software's default port. If the DNS implementation is not configured for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port, this is a finding.
Configure the DNS implementation for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port.
Review the DNS server implementation configuration to determine if it validates other DNS servers' unique identify, through the use TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from the other DNS servers. If the DNS server does not validate other DNS servers' unique identity, through the use of either TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from those other DNS servers, this is a finding.
Configure the DNS server to verify another DNS server's unique identify, through the use of TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from other DNS servers.
Review the DNS server implementation configuration to determine if the DNS server, when using PKI-based authentication (e.g., SIG(0)), enforces authorized access to the corresponding private key. If the DNS server does not enforce authorized access to the private key, this is a finding.
Configure the DNS server to enforce authorized access to the corresponding private key when using PKI-based authentication.
Review the DNS system to determine ownership of the key file and the account under which the name server software is run. If the key file owner is not the same account as the account under which the name server is run, this is a finding.
Change ownership for the key file to the account under which the name server software is run.
Review the DNS system to determine privileges on the key file and the account under which the name server software is run. If the account under which the name server software is run is not the only account which has read/modify permissions to the key file, this is a finding.
Apply permissions to the key file to provide read/modify permissions only to the account under which the name server software is run.
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, verify only the private keys corresponding to the ZSK (Zone Signing Key) are located on the server. If the private keys to the KSK are located on the name server that accepts dynamic updates, this is a finding.
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
Verify the DNS operational procedures and confirm procedures exist to enforce generating signatures using the KSK are performed off-line, using the KSK-private stored off-line or the secure, protected module. If the procedures do not exist or the procedures do not specify to perform the signature generation off-line from the name server, this is a finding.
Create operation documentation to include the safe management of keys and key storage within the DNS implementation. Include in the documentation steps to ensure signature generation using the KSK are done off-line, using the KSK-private stored off-line or the secure, protected module.
Review the DNS implementation's authentication methods and settings to determine if multifactor authentication is utilized to gain nonlocal access for maintenance and diagnostics. If multifactor authentication is not utilized, this is a finding.
Configure the DNS system to utilize multifactor authentication for nonlocal access for maintenance and diagnostics.
Review the zones hosted by the DNS server. Verify each of the zones have been digitally signed. To determine if the zones have been digitally signed, verify the existence of an RRSET for each zone, which will include, at a minimum, an RRType RRSIG (Resource Record Signature) as well as an RRType DNSKEY and RRType NSEC (Next Secure). If the DNS server's zones do not contain these additional RRs along with the regular RRs, this is a finding.
Generate an RRSET for each zone hosted by the DNS server to include an RRSIG, DNSKEY and NSEC for each zone.
Review the zones hosted by the DNS server. Every zone should have an RRSET which includes the RRTypes of RRSIG, DNSKEY and NSEC. If a zone has a child, the RRSET should also include the RRType DS (Delegation Signer) RR, which contain the (hash) public key of child zones. If the zones hosted by the DNS server do not have any child domains, this is not a finding. If the zones hosted by the DNS server have child domains, and there is not an RRType DS RR in the zone's RRSET, this is a finding.
Configure each child zone to upload its DS RRset to the parent zone.
Review the DNS configuration files. Ensure the validity period for RRSIGs for all zones' delegated children has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs for all zones' delegated children is less than two days or greater than one week, this is a finding.
Configure RRSIGs for all zones' delegated children to be greater than two days and less than one week.
Review the DNS server implementation configuration to determine if the DNS server enforces approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices that restrict zone transfers between DNS servers, and dynamic updates from DNS clients to the master name server, to digitally signed traffic. If the DNS server does not enforce approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices, restricting zone transfers between DNS servers and dynamic updates from DNS clients to the master name server to digitally signed traffic, this is a finding.
Configure the DNS server to enforce approved authorizations for controlling the information flow by applying DNSSEC and TSIG signing practices to the DNS implementation.
If the system being reviewed is an authoritative server, it must be able to provide records that can be authenticated (DS, RRSIG, etc.). Compare the child zone's hash stored in the child's DS RR to the hash for the child's zone in the parent's zone information. Verify it is the same hash. If the hashes do not match, or the child zone is not digitally signed, this is a finding. If the system is a recursive server, it must be able to pass DNSSEC data and perform DNSSEC validation. If DNSSEC validation capability is not enabled on a recursive DNS server, this is a finding. If the hash for child domains is not reflected in the parent zone and the chain of trust is not verifiable, this is a finding.
Configure a recursive, caching only server with the ability to perform DNSSEC validation. Configure an authoritative name server to sign all zones and to update the entire chain of trust with the signature.
Review the DNS server implementation to confirm zone transfers are signing using transaction signing (TSIG) shared key or via SIG(0) asymmetric cryptography public keys. If the DNS server does not ensure integrity of zone transfers by TSIG or SIG(0) signing, this is a finding.
Configure the DNS server with transaction signing (TSIG) or SIG(0).
Review the DNS server configuration to determine if communication sessions for dynamic updates are provided authenticity protection. If communications sessions do not employ authenticity protections, this is a finding.
Configure the DNS server to employ mechanisms to protect the authenticity of communications sessions for dynamic updates.
Review the DNS server configuration to ensure all zones are configured to provide resolvers with verification of query response integrity via DNSSEC. If the DNS Server configuration is not configured to provide resolvers with verification of query response integrity via the implementation of DNSSEC, this is a finding.
Configure the DNS server to provide resolvers with verification of query response integrity via DNSSEC.
Review the DNS server implementation configuration to determine if the DNS server fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the DNS server does not fail to a secure state under these conditions, this is a finding.
Configure the DNS server to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
Review the DNS server implementation configuration to determine if the DNS server preserves any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes. If the DNS server does not preserve the necessary information, this is a finding.
Configure the DNS server to preserve any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes.
Review the DNS server implementation configuration to determine if the DNS server protects the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest. If the DNS server does not properly protect confidentiality and integrity, this is a finding.
Configure the DNS server to protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.
Review the DNS vendor documentation and system configuration to determine if object reuse is protected. If object reuse is not protected, this is a finding.
Configure the DNS system to protect object reuse to prevent unauthorized and unintended information transfer via shared system resources.
Review the DNS server implementation documentation and system settings to determine if the system restricts the ability of users or systems to launch Denial of Service (DoS) attacks against other information systems or networks from the DNS server. If the DNS system is not configured to restrict this ability, this is a finding.
Configure the DNS system to restrict the ability of users or other systems to launch Denial of Service (DoS) attacks from the DNS system.
Review the DNS server implementation and configuration to determine if excess capacity and bandwidth are managed and redundancy is built into the system to limit the effects of information flooding types of DoS attacks. If excess capacity and bandwidth are not managed, or redundancy is not built into the architecture, this is a finding.
Configure the DNS server to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of DoS attacks.
Review the DNS server implementation configuration to determine if the DNS server checks the validity of all data inputs except those specifically identified by the organization. If the DNS server does not check the validity of all data inputs, this is a finding.
Configure the DNS server to check the validity of all data inputs except those specifically identified by the organization.
Review the DNS server implementation configuration to determine if the DNS server activates a notification to the system administrator when a component failure is detected. If the DNS server does not activate a notification to the system administrator when a failure is detected, this is a finding.
Configure the DNS server so that when a component failure is detected, the server activates a notification to the system administrator.
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures. If the DNS server is not configured to generate such audit records, this is a finding.
Configure the DNS server to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures.
Review the DNS server implementation configuration to determine if the DNS server strongly binds the identity of the DNS server with the DNS information. Examples include enabling DNSSEC and enabling TSIG or SIG(0). If the DNS server does not strongly bind the identity of the DNS server with the DNS information, this is a finding.
Configure the DNS server to strongly bind the identity of the DNS server with the DNS information.
Review the DNS server implementation configuration to determine if the DNS server provides the means for authorized individuals to determine the identity of the source of the DNS server-provided information. If the DNS server does not provide such means, this is a finding.
Configure the DNS server to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
Review the DNS server implementation configuration to determine if the DNS server validates the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer). If the DNS server does not validate the binding of the other DNS server's identity to the DNS information, this is a finding.
Configure the DNS server to validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
Review the DNS server implementation configuration to determine if the DNS server, when it encounters an event or an error when validating the binding of another DNS server's identity to the DNS information, is configured to log the event and send notification to the DNS administrator. If the DNS server does not log the event and send notification to the DNS administrator in the event of such a validation error, this is a finding.
Configure the DNS server to log the event and send notification to the DNS administrator in the event an error occurs when validating the binding of another DNS server's identity to the DNS information.
Review the DNS server configuration to determine if recursion is being performed on an authoritative name server. If an authoritative name server also performs recursion, this is a finding.
Ensure the DNS server is not defined as both authoritative and recursive.
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.
Review the DNS server implementation configuration to determine if the DNS server authenticates another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based. If the DNS server does not authenticate another DNS server before establishing a connection, this is a finding.
Configure the DNS server to authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.
Review the DNS server implementation configuration to determine if the DNS server, for PKI-based authentication (i.e., SIG(0)), implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the DNS server does not implement such a cache of revocation data, this is a finding.
Configure the DNS server, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
Review the DNS server implementation configuration to determine if the DNS server provides data origin artifacts for internal name/address resolution queries. If the DNS server does not provide these data origin artifacts, this is a finding.
Configure the DNS server to provide data origin artifacts for internal name/address resolution queries.
Review the DNS server implementation configuration to determine if the DNS server provides data integrity protection artifacts for internal name/address resolution queries. If the DNS server does not provide these artifacts, this is a finding.
Configure the DNS server to provide data integrity protection artifacts for internal name/address resolution queries.
Review the DNS server implementation configuration to determine if the DNS server provides additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries. If the DNS server does not provide such integrity artifacts, this is a finding.
Configure the DNS server to provide additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
Review the DNS server implementation configuration to determine if the DNS server requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data origin authentication verification on the responses, this is a finding.
Configure the DNS server to request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
Review the DNS server implementation configuration to determine if the DNS server requests data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data integrity verification on the responses, this is a finding.
Configure the DNS server to request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
Review the DNS server implementation configuration to determine if the DNS server performs data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data integrity verification on the responses, this is a finding.
Configure the DNS server to perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
Review the DNS server implementation configuration to determine if the DNS server performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data origin verification authentication on the responses, this is a finding.
Configure the DNS server to perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
If the DNS server is using SIG(0), review the DNS server implementation configuration to determine if the DNS server only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions. If the DNS server allows the use of other certificate authorities, this is a finding.
Configure the DNS server to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions.
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized modification of zone data. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized modification, this is a finding.
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized modification of zone data.
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized disclosure, this is a finding.
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server.
Review the DNS implementation configuration to determine if the DNS server protects the integrity of transmitted information. If the DNS server does not protect the integrity of transmitted information, this is a finding.
Configure the DNS server to protect the integrity of transmitted information.
Review the DNS server implementation configuration to determine if the DNS server implements cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS). If the DNS server does not implement such cryptographic mechanisms, this is a finding.
Configure the DNS server to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution Systems (PDS).
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during preparation for transmission. If the DNS server does not maintain the integrity during preparation for transmission, this is a finding.
Configure the DNS server to maintain the integrity of information during preparation for transmission.
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during reception. If the DNS server does not maintain integrity during reception, this is a finding.
Configure the DNS server to maintain the integrity of information during reception.
Review the DNS server implementation configuration to determine if the DNS server behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the DNS server does not behave in such a manner, this is a finding.
Configure the DNS server to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
Review the DNS server implementation operating documentation to determine if procedures exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality. If procedures do not exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality, this is a finding.
Develop internal procedures to ensure a secondary name server to the master in the event the master DNS name server permanently loses functionality.
Review the DNS server implementation configuration to determine if the DNS server performs verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days. If the DNS server does not perform this verification when needed, this is a finding.
Configure the DNS server to perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
Review the DNS server implementation configuration to determine if the DNS server logs the event and notifies the system administrator when anomalies in the operation of the signed zone transfers are discovered. If the DNS server implementation does not log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered, this is a finding.
Configure the DNS server to log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.
Review the DNS system to determine if it is configured to log success and failure of the start and stop of the name server service or daemon. If the DNS system is not configured to log these events, this is a finding.
Configure the DNS system to log success and failure of the start and stop of the name service or daemon.
Review the DNS system to determine if it is configured to log, at a minimum, success and failure of zone transfers dynamic updates, and start and stop of the name server service or daemon. If the DNS is not configured to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon, this is a finding.
Configure the DNS system to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon.
Review the DNS implementation and configuration files to ensure FIPS-validated cryptography is being used when provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information that requires confidentiality. If the DNS configuration does not use FIPS-validated cryptography, this is a finding.
Configure the DNS implementation to use NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
Check the DNS configuration files and operational documentation. If the zone's RRs have been signed with NSEC3, the operational procedures should stipulate to change the salt value every time the zone is completely re-signed. If the operational procedures do not specify to change the salt value for RRs signed with NSEC3 every time the zone is completely re-signed, this is a finding.
Include instructions in the DNS operational procedures to change the salt value every time RRs signed by NSEC3 have been re-signed.
Review the DNS configuration files. Ensure the validity period for RRSIGs has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs covering a zone's DNSKEY RRSet is less than two days or greater than one week, this is a finding.
Configure RRSIGs covering each zone's DNSKEY RRSet to be greater than two days and less than one week.
Review the zone file's configuration for internal zones and confirm the NSEC3 RR option is used to provide authenticated denial of existence. If the NSEC3 RR option is not used for internal zones, this is a finding.
Configure all internal zones to use the NSEC3 RR option for authenticated denial of existence.
Review the zone file's configuration and confirm that each NS record points to an active name server authoritative for the domain. If this is not the case, this is a finding.
Remove any NS record in a zone file that does not point to an active name server authoritative for the domain specified in that record.
Review the DNS implementation and documentation and confirm the permissions on the key files, which were generated by the dnssec-keygen program and copied to the name server, are only accessible to the server administrator or have been deleted. Verify all paper copies of the key files have been destroyed. If the key files have been deleted and all paper copies have been destroyed, this is not a finding. If the key files have been deleted but the paper copies have not been destroyed, this is a finding. If the key files still exist, and the permissions on the key files have not been configured to only allow the server administrator account access, this is a finding.
Configure permissions on the key files to only give access to the server administrator, or delete the key files altogether. Destroy all paper copies of the key files.
Review the DNS configuration files to determine all of the NS records for each zone. Based upon the NS records for each zone, determine location of each of the name servers. Verify all authoritative name servers are located on different network segments. If two authoritative name servers are found on the same network segment, and one of those two is hidden, this is not a finding. If any authoritative name servers are located on the same network segment as another authoritative name server, this is a finding.
Locate all visible (non-hidden) name servers to be on different network segments.
Review the DNS configuration for each zone hosted by the authoritative name server. Determine all authoritative name servers for each zone. Review the serial number in the SOA RDATA, on each authoritative name server for each zone, and ensure the serial number is the same on each secondary name server as on the primary name server. If any secondary name server for a zone has a serial number in the SOA RDATA that is different from the primary name server, this is a finding.
Troubleshoot and fix any problems with zone transfers completing successfully between the primary name server and all secondary name servers.
Check the DNS configuration to ensure DNSSEC Resource Records has been enabled. If the name server is not configured with DNSSEC enabled, this is a finding.
Configure the name server with DNSSEC enabled.
Review the DNS implementation and documentation. Confirm the signature algorithm used for DNSSEC-enabled zones is FIPS-compatible. If the signature algorithm used for DNSSEC-enabled zones is not FIPS-compatible, this is a finding.
Regenerate signatures for all DNSSEC-enabled zones with FIPS-compatible algorithms.
Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NAT'd through the perimeter firewall. Verify the RRs in the internal name server are not also listed in the external name server. If there are RRs in the internal name server for hosts also listed in the external name server, and the IP to which it resolves is on the external network, this is a finding. Verify the RRs in the external name server are not also listed in the internal name server. If there are RRs in the external name server for hosts also listed in the internal name server, and the IP to which it resolves is on the internal network, this is a finding.
Remove any RRs listed in the internal name server configuration which resolve for external hosts and remove any RRs listed in the external name server configuration which resolve to internal hosts. For hosts intended to be accessed by both internal and external clients, configure unique IP addresses in each of the internal and external name servers, respective to their location. The perimeter firewall, or other routing device, should handle the Network Address Translation to the true IP address of the destination.
Review the DNS implementation and ensure the external DNS name servers are not reachable by internal resolvers. If the external DNS name servers can be reached by internal resolvers, this is a finding.
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
Review the DNS implementation and ensure internal DNS name servers are not reachable by external resolvers. If the internal DNS name servers can be reached by external resolvers, this is a finding.
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
Review the DNS configuration files. Verify a configuration is in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests. If a configuration is not in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests, this is a finding.
Configure the authoritative name server to specify which secondary name servers from which it will receive zone transfer requests.
Review DNS implementation documentation to determine whether the DNS system has capabilities compliant to IETF RFC-1034 (Domain Names-Concepts and Facilities), RFC-1035 (Domain Names-Implementation and Specification), and subsequent RFCs. Systems using DNSSEC (DNS Security Extensions) should be compliant to RFC-4033 (DNS Security Introduction and Requirements), RFC-4024 (Resource Records for the DNS Security Extensions), RFC-4035 (Protocol Modifications for the DNS security Extensions), RFC-5155 (DNS Security (DNSSEC) Hashed Authenticated Denial of Existence) and related RFCs. A DNS implementation may also be found non-compliant by empirical analysis, i.e., by experimentally querying and examine the answer. For example, a DNS implementation may not answer a query for the 'NS' resource record type with a CNAME reply. If the implementation does not comply to the IETF DNS RFCs, this is a finding.
Configure the DNS implementation to be compliant to the IETF specifications for DNS. Protect DNS transactions, such as update of DNS name resolution data and data replication that involve DNS nodes within an enterprise's control. The transactions should be protected using hash-based message authentication codes based on shared secrets, as outlined in Internet Engineering Task Force's (IETF) Transaction Signature (TSIG) specification. Protect the ubiquitous DNS query/response transaction that could involve any DNS node in the global Internet using digital signatures based on asymmetric cryptography, as outlined in IETF's Domain Name System Security Extension (DNSSEC) specification.
Review the DNS configuration and access control structure to determine if DACs are in place to limit the propagation of rights as determined by the organization. Access control lists for user permissions, as well as zone transfers and updates, must be present. If they are not present, this is a finding.
Configure the DNS implementation to eliminate access rights propagation.
Review the zone configuration with the DNS administrator and verify whether the zone has records on both the internal and external networks. If the zone is split, verify there is a separate external name server to handle the host records for external address space and an internal name server to handle the host records for internal address space. If there are split zones and there are not internal and external roles to protect private address space, this is a finding.
Configure the DNS server to separate internal and external roles to protect private address space.
Review the entries within the root hints file and validate that the entries are correct. G and H root servers are required on the NIPRNet, as a minimum. All default settings on servers must be verified and corrected if necessary. If valid root name servers are not configured, this is a finding.
Configure the DNS implementation to use valid root name servers.
Review the DNS implementation to determine the name server software version. If the installed name server software version is not the latest production version, this is a finding.
Update the installed name server software with the latest production version.
Review the account under which the DNS software is running and determine the permissions that account has been assigned. If the account under which the DNS software is running has not been restricted to the least privileged permissions required for the purpose of running the software, this is a finding.
Configured the permissions of the account being used to run the DNS software so that it has the least privileges required under which to run the DNS software.
Check the DNS documentation to determine if a hidden master authoritative name server is being used. If a hidden master authoritative name server is being used, check the NS records for all zones for which that hidden name server is authoritative and confirm there is not any NS record for that hidden name server. If any zone for which a hidden name server is authoritative has an NS record for that hidden name server, this is a finding. If the DNS implementation does not include any hidden name servers, this is not applicable.
Remove, from all zones' configuration files, any NS RRs for hidden name servers.
Review the name server configuration. Verify the server is configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG. If the DNS server is not configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG, this is a finding.
Configure the DNS name server to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.
Review the DNS configuration. Determine if a static port is being used to send outgoing DNS messages or whether it is configured to use a random port. If the DNS configuration specifies a static port to be used for outgoing DNS messages rather than a random port, this is a finding.
Configure the DNS server to use a random port for outgoing DNS messages.
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, ensure the private key corresponding to the ZSK alone is protected with directory/file-level access control list-based or cryptography-based protections. If the private key corresponding to the ZSK alone is not protected with directory/file-level access control list-based or cryptography-based protections, this is a finding.
Apply permissions to the private key corresponding to the ZSK alone with read/modify permissions for the account under which the name server software is run.
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are not accepted, verify the private keys corresponding to both the ZSK (Zone Signing Key) and KSK (Key Signing Key) are not located on the name server. If the private keys to the ZSK and/or the KSK are located on the name server, this is a finding.
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
Review the zone files and confirm with the DNS administrator that the hosts defined in the zone files do not resolve to hosts in another zone with its fully qualified domain name. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated. If resource records are maintained that resolve to a fully qualified domain name in another zone, and the usage is not for resource records resolving to hosts that are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a documented and approved mission need, this is a finding.
Remove any resource records in a zone file if the resource record resolves to a fully qualified domain name residing in another zone.
Review the DNS server's hosted zones and respective records. Within the zone statement will be a file option that will display the name of the zone file. The record type column will display CNAME. This is usually the third or fourth field in a record depending on whether the TTL value is utilized. Without a TTL value, the CNAME type will be in the third field; otherwise, it will display as the fourth field. Review the zone files and the DNS zone record documentation to confirm that there are no CNAME records older than 6 months. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated (AO approval of use of a commercial cloud offering would satisfy this requirement). If there are zone-spanning CNAME records older than 6 months and the CNAME records resolves to anything other than fully qualified domain name for glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a AO-approved and documented mission need, this is a finding.
Remove any zone-spanning CNAME records that have been active for more than six months.
Review the DNS server implementation configuration to determine if the DNS server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the DNS server is not configured in accordance with these settings, this is a finding.
Configure the DNS server to be in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Review the DNS implementation. Verify that each pair of communicating hosts has a unique TSIG key (i.e., a separate key for each secondary name server to authenticate transactions with the primary name server, etc.) If a unique TSIG key has not been generated for each pair of communicating hosts, this is a finding.
Regenerate a unique TSIG key for each pair of communicating hosts within the DNS architecture.
Review the NS records for each zone hosted and confirm that each authoritative name server is located at a different physical location than the remaining name servers. If the master, or primary, authoritative name server is configured to be "hidden", it will not have an NS record. One other name server may be at the same physical location as the hidden name server. If all name servers, for which NS records are listed, are not physically at different locations, this is a finding.
Physically move name servers so that they are geographically at different locations. If moving a name server is not feasible, one of the co-located name servers could be reconfigured to be hidden.
Verify the DNS server implementation is configured to disable accounts when the accounts have expired. If the DNS server implementation is not configured to disable accounts when the accounts have expired, this is a finding.
Configure the DNS server implementation to disable accounts when the accounts have expired.
Verify the DNS server implementation is configured to disable accounts when the accounts are no longer associated to a user. If the DNS server implementation is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Configure the DNS server implementation to disable accounts when the accounts are no longer associated to a user.
Verify the DNS server implementation is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the DNS server implementation is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Configure the DNS server implementation to implement the capability to centrally review and analyze audit records from multiple components within the system.
Verify the DNS server implementation is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the DNS server implementation is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Configure the DNS server implementation to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
Verify the DNS server implementation is configured to automatically generate audit records of the enforcement actions. If the DNS server implementation is not configured to automatically generate audit records of the enforcement actions, this is a finding.
Configure the DNS server implementation to automatically generate audit records of the enforcement actions.
Verify the DNS server implementation is configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization. If the DNS server implementation is not configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Configure the DNS server implementation to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
Verify the DNS server implementation is configured to require users to be individually authenticated before granting access to the shared accounts or resources. If the DNS server implementation is not configured to require users to be individually authenticated before granting access to the shared accounts or resources, this is a finding.
Configure the DNS server implementation to require users to be individually authenticated before granting access to the shared accounts or resources.
Verify the DNS server implementation is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the DNS server implementation is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Configure the DNS server implementation to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
Verify the DNS server implementation is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the DNS server implementation is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Configure the DNS server implementation to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
Verify the DNS server implementation is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the DNS server implementation is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Configure the DNS server implementation to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
Verify the DNS server implementation is configured to update the list of passwords on an organization-defined frequency. If the DNS server implementation is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Configure the DNS server implementation to update the list of passwords on an organization-defined frequency.
Verify the DNS server implementation is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the DNS server implementation is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Configure the DNS server implementation to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
Verify the DNS server implementation is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the DNS server implementation is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Configure the DNS server implementation to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
Verify the DNS server implementation is configured to store passwords using an approved salted key derivation function, preferably using a keyed hash. If the DNS server implementation is not configured to store passwords using an approved salted key derivation function, preferably using a keyed hash, this is a finding.
Configure the DNS server implementation to store passwords using an approved salted key derivation function, preferably using a keyed hash.
Verify the DNS server implementation is configured to require immediate selection of a new password upon account recovery. If the DNS server implementation is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Configure the DNS server implementation to require immediate selection of a new password upon account recovery.
Verify the DNS server implementation is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the DNS server implementation is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Configure the DNS server implementation to allow user selection of long passwords and passphrases, including spaces and all printable characters.
Verify the DNS server implementation is configured to employ automated tools to assist the user in selecting strong password authenticators. If the DNS server implementation is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Configure the DNS server implementation to employ automated tools to assist the user in selecting strong password authenticators.
Verify the DNS server implementation is configured to enforce organization-defined composition and complexity rules. If the DNS server implementation is not configured to enforce organization-defined composition and complexity rules, this is a finding.
Configure the DNS server implementation to enforce organization-defined composition and complexity rules.
Verify the DNS server implementation is configured to implement a local cache of revocation data to support path discovery and validation. If the DNS server implementation is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Configure the DNS server implementation to implement a local cache of revocation data to support path discovery and validation.
Verify the DNS server implementation is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the DNS server implementation is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Configure the DNS server implementation to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
Verify the DNS server implementation is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the DNS server implementation is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Configure the DNS server implementation to include only approved trust anchors in trust stores or certificate stores managed by the organization.
Verify the DNS server implementation is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the DNS server implementation is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Configure the DNS server implementation to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
Verify the DNS server implementation is configured to synchronize system clocks within and between systems or system components. If the DNS server implementation is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Configure the DNS server implementation to synchronize system clocks within and between systems or system components.
Verify the DNS server implementation is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the DNS server implementation is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Configure the DNS server implementation to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.