BIND-9X-001610 - The BIND 9.x implementation must not use a TSIG or DNSSEC key for more than one year.

Information

Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the application, including the parameters required to satisfy other security control requirements.

Configuring the DNS server implementation to follow organizationwide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DOD that reflects the most restrictive security posture consistent with operational requirements.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Generate new DNSSEC and TSIG keys.

For DNSSEC keys:

Use the newly generated keys to resign all of the zone files on the name server.

For TSIG keys:

Update the named.conf file with the new keys.

Restart the BIND 9.x process.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-272414r1123797_rule, STIG-ID|BIND-9X-001610, Vuln-ID|V-272414

Plugin: Unix

Control ID: 1b1e51e7cdb4645d122ca78a18db448ba94ec7e02da6acc7e35392f12a0ee361