Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-13048 | DNS0405 | SV-13616r1_rule | Medium |
Description |
---|
If external hosts are able to query a name server on the internal network, then there is the potential that an external adversary can obtain information about internal hosts that could assist the adversary in a network attack. External hosts should never be able to learn about the internal network in this manner. |
STIG | Date |
---|---|
DNS Policy Security Technical Implementation Guide | 2017-10-02 |
Check Text ( C-3481r1_chk ) |
---|
Work with the Network administrator to determine whether external hosts are able to query a name server on the internal network. DNS runs on ports 53/TCP for zone transfers and 53/UDP for queries. These ports should be blocked at the firewall or router to internal DNS servers. If external hosts are able to query a name server on the internal network, then this is a finding. |
Fix Text (F-4357r1_fix) |
---|
Working with appropriate technical personnel, the IAO should establish firewall rules and/or router ACLs that prohibit access to the name server from external hosts. |