Information
Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions only and is provided by TSIG/SIG(0), which enforces mutual server authentication using a key that is unique to each server pair (TSIG) or using PKI-based authentication (SIG[0]), thus uniquely identifying the other server.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Create a separate TSIG key-pair for each key statement listed in the named.conf file.
Configure the name server to use separate TSIG key-pairs for each key statement listed in the named.conf file.
Restart the BIND 9.x process.