UCF STIG Viewer Logo

The DNS server implementation must authenticate the other DNS server before responding to a server-to-server transaction.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54861 SRG-APP-000394-DNS-000049 SV-69107r1_rule Medium
Description
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage devices. It is an additional layer of authentication ensuring only specific pre-authorized devices can access the system. This requirement applies to server-to-server (zone transfer) transactions only and is provided by TSIG/SIG(0), which enforces mutual server authentication using a key that is unique to each server pair (TSIG) or using PKI-based authentication (SIG(0)).
STIG Date
Domain Name System (DNS) Security Requirements Guide 2015-01-05

Details

Check Text ( C-55483r1_chk )
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Fix Text (F-59719r1_fix)
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.