BIND-9X-001405 - A BIND 9.x implementation operating in a split DNS configuration must be approved by the organizations Authorizing Official.

Information

BIND 9.x has implemented an option to use 'view' statements to allow for split DNS architecture to be configured on a single name server.

If the split DNS architecture is improperly configured there is a risk that internal IP addresses and host names could leak into the external view of the DNS server.

Allowing private IP space to leak into the public DNS system may provide a person with malicious intent the ability to footprint your network and identify potential attack targets residing on your private network.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Obtain approval for the split DNS implementation from the Authorizing Official.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-207588r879887_rule, STIG-ID|BIND-9X-001405, STIG-Legacy|SV-87117, STIG-Legacy|V-72493, Vuln-ID|V-207588

Plugin: Unix

Control ID: 501c2d790e96023aa228580eae1ab731c63298b3f4bc4adb904474efc2feadcb