BIND-9X-002470 - The host running a BIND 9.x implementation must have DNS cookies enabled.

Information

DNS cookies can help prevent spoofing and cache poisoning attacks by verifying the identity of both the client and server. They do this by including a cryptographic identifier (the cookie) in DNS messages, which can be verified in future messages. This makes it difficult for an attacker to learn the cookie values and thus spoof them.

Solution

Edit the named.conf file:

options {
answer-cookie yes;
};

After making changes, save the named.conf file and restart the BIND service to apply the changes.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V3R1_STIG.zip