UCF STIG Viewer Logo

Hosts outside an enclave can directly query or request a zone transfer from a name server that resides on the internal network (i.e., not in a DMZ).


Overview

Finding ID Version Rule ID IA Controls Severity
V-13048 DNS0405 SV-13616r1_rule ECAN-1 Medium
Description
If external hosts are able to query a name server on the internal network, then there is the potential that an external adversary can obtain information about internal hosts that could assist the adversary in a network attack. External hosts should never be able to learn about the internal network in this manner.
STIG Date
DNS Policy 2013-07-08

Details

Check Text ( C-3481r1_chk )
Work with the Network administrator to determine whether external hosts are able to query a name server on the internal network. DNS runs on ports 53/TCP for zone transfers and 53/UDP for queries. These ports should be blocked at the firewall or router to internal DNS servers. If external hosts are able to query a name server on the internal network, then this is a finding.
Fix Text (F-4357r1_fix)
Working with appropriate technical personnel, the IAO should establish firewall rules and/or router ACLs that prohibit access to the name server from external hosts.