BIND-9X-001610 - A BIND 9.x server NSEC3 must be used for all internal DNS zones.

Information

To ensure that RRs associated with a query are really missing in a zone file and have not been removed in transit, the DNSSEC mechanism provides a means for authenticating the nonexistence of an RR. It generates a special RR called an NSEC (or NSEC3) RR that lists the RRTypes associated with an owner name as well as the next name in the zone file. It sends this special RR, along with its signatures, to the resolving name server. By verifying the signature, a DNSSEC-aware resolving name server can determine which authoritative owner name exists in a zone and which authoritative RRTypes exist at those owner names.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Resign each zone that is missing NSEC records.

Restart the BIND 9.x process.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-207593r879887_rule, STIG-ID|BIND-9X-001610, STIG-Legacy|SV-87127, STIG-Legacy|V-72503, Vuln-ID|V-207593

Plugin: Unix

Control ID: 385d8a49c805d55c55df0ebd8b0b8be001c0771c3f4a5bafa5c7ee928f20dfd9