Information
The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. In DNSSEC, trust in the public key (for signature verification) of the source is established not by going to a third party or a chain of third parties (as in public key infrastructure [PKI] chaining), but by starting from a trusted zone (such as the root zone) and establishing the chain of trust down to the current source of response through successive verifications of signature of the public key of a child by its parent. The public key of the trusted zone is called the trust anchor. After authenticating the source, the next process DNSSEC calls for is to authenticate the response. DNSSEC mechanisms involve two main processes: sign and serve, and verify signature.
Before a DNSSEC-signed zone can be deployed, a name server must be configured to enable DNSSEC processing.
Satisfies: SRG-APP-000516-DNS-000089, SRG-APP-000347-DNS-000041, SRG-APP-000348-DNS-000042, SRG-APP-000420-DNS-000053, SRG-APP-000421-DNS-000054, SRG-APP-000158-DNS-000015, SRG-APP-000422-DNS-000055, SRG-APP-000215-DNS-000003, SRG-APP-000423-DNS-000056, SRG-APP-000424-DNS-000057, SRG-APP-000425-DNS-000058, SRG-APP-000426-DNS-000059, SRG-APP-000219-DNS-000030
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
DNSSEC Keys:
From the BIG-IP GUI:
1. DNS.
2. Zones.
3. DNSSEC Zones.
4. DNSSEC Zone List.
5. Click the name of the zone.
6. Move a key for both "Zone Signing Key" and "Key Signing Key" into the "Active" column.
7. Click "Update".
Note: To create a Zone Signing Key and/or Key Signing Key, go to DNS >> Delivery >> Keys >> DNSSEC Key List.
TSIG Key:
1. DNS.
2. Delivery.
3. Nameservers.
4. Nameserver List.
5. Click on the name of the Nameserver.
6. Select a value from the drop-down for "TSIG Key".
7. Click "Update".
Note: To create a TSIG Key, go to DNS >> Delivery >> Keys >> TSIG Key List.
Item Details
Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION
References: 800-53|AU-10(1)(a), 800-53|AU-10(1)(b), 800-53|CM-6b., 800-53|IA-3, 800-53|SC-20(2), 800-53|SC-20a., 800-53|SC-20b., 800-53|SC-21, 800-53|SC-23, CAT|II, CCI|CCI-000366, CCI|CCI-000778, CCI|CCI-001184, CCI|CCI-001663, CCI|CCI-001901, CCI|CCI-001902, CCI|CCI-002462, CCI|CCI-002463, CCI|CCI-002464, CCI|CCI-002465, CCI|CCI-002466, CCI|CCI-002467, CCI|CCI-002468, Rule-ID|SV-265982r1024488_rule, STIG-ID|F5BI-DN-300013, Vuln-ID|V-265982
Control ID: 0b1c2ca43dc2f09ee822623d6b59206b30b1715663f9db95f791a7907b0e91ed