BIND-9X-001400 - On a BIND 9.x server, all root name servers listed in the local root zone file hosted on a BIND 9.x authoritative name server must be valid for that zone.

Information

All caching name servers must be authoritative for the root zone because, without this starting point, they would have no knowledge of the DNS infrastructure and thus would be unable to respond to any queries. The security risk is that an adversary could change the root hints and direct the caching name server to a bogus root server. At that point, every query response from that name server is suspect, which would give the adversary substantial control over the network communication of the name servers' clients.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the local root zone file.

Ensure that the root servers listed match the IANA list.

Ensure that the DNS keys and trust anchors listed match the IANA list.

Restart the BIND 9.x process.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-272396r1124054_rule, STIG-ID|BIND-9X-001400, Vuln-ID|V-272396

Plugin: Unix

Control ID: f1a58d897fe3bf9ce154d3ec332b8d0a5d3f94922940fad7ce7dc2fc1f821199