UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS server implementation must authenticate the other DNS server before responding to a server-to-server transaction.


Overview

Finding ID Version Rule ID IA Controls Severity
V-205203 SRG-APP-000394-DNS-000049 SV-205203r879767_rule Medium
Description
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage devices. It is an additional layer of authentication ensuring only specific pre-authorized devices can access the system. This requirement applies to server-to-server (zone transfer) transactions only and is provided by TSIG/SIG(0), which enforces mutual server authentication using a key that is unique to each server pair (TSIG) or using PKI-based authentication (SIG(0)).
STIG Date
Domain Name System (DNS) Security Requirements Guide 2023-06-12

Details

Check Text ( C-5470r392522_chk )
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Fix Text (F-5470r392523_fix)
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.