Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-72483 | BIND-9X-001400 | SV-87107r1_rule | Medium |
Description |
---|
Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. External clients need to receive RRs that pertain only to public services (public Web server, mail server, etc.) Internal clients need to receive RRs pertaining to public services as well as internal hosts. The zone information that serves the RRs on both the inside and the outside of a firewall should be split into different physical files for these two types of clients (one file for external clients and one file for internal clients). |
STIG | Date |
---|---|
BIND 9.x Security Technical Implementation Guide | 2019-03-19 |
Check Text ( C-72685r1_chk ) |
---|
If the BIND 9.x name server is not configured for split DNS, this is Not Applicable. Verify that the BIND 9.x server is configured to use separate views and address space for internal and external DNS operations when operating in a split configuration. Inspect the "named.conf" file for the following: view "internal" { match-clients { zone "example.com" { type master; file "internals.example.com"; }; }; view "external" { match-clients { zone "example.com" { type master; file "externals.db.example.com"; allow-transfer { slaves; }; }; }; If the internal and external view statements are configured to use the same zone file, this is a finding. Inspect the zone file defined in the internal and external view statements. If any resource record is listed in both the internal and external zone files, this is a finding. |
Fix Text (F-78839r1_fix) |
---|
Edit the "named.conf" file. Configure the internal and external view statements to use separate zone files. Edit the internal and external zone files. Configure the zone file to use RRs designated for internal or external use. The zone files should not share any RR. |