UCF STIG Viewer Logo

The network element must prevent discovery of specific system components or devices composing a managed interface.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34148 SRG-NET-000199-DNS-NA SV-44601r1_rule Medium
Description
Allowing neighbor discovery messages to reach external network nodes is dangerous as it provides an attacker a method to obtain information of the network infrastructure that can be useful to plan an attack. In addition, responding to the sending node that a packet cannot be forwarded as the destination host is unreachable provides network mapping information. Furthermore, if a router receives a large number of packets that cannot be forwarded, the router processor could be overloaded if it must generate a high volume of unreachable messages. To mitigate the risk of reconnaissance or a Denial of Service (DoS) attack, all external-facing interfaces must be configured to silently drop unreachable traffic, not announce network address information, and to ignore neighbor solicitation messages. Network device discovery is not a function of DNS.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42108r1_chk )
This is not a function of DNS.
Fix Text (F-38058r1_fix)
This requirement is NA for DNS. No fix required.