Check: DNS0915
CISCO CSS DNS:
DNS0915
(in version v4 r1.18)
Title
CSS DNS does not cryptographically authenticate APP sessions. (Cat I impact)
Discussion
The risk to the CSS DNS in this situation is the CSS DNS peers do not authenticate each other, the sending and receiving of APP session data and peer communication may be with an adversary rather than the intended peer, thereby sending sensitive network architecture data and receiving ill intended zone data. To protect against this possibility, the CSS DNS peers must cryptographically authenticate each other.
Check Content
In the presence of the reviewer, the CSS DNS administrator should enter the following command while in global configuration mode: show app session Confirm the authentication type is set to “authChallenge” and the encryption type is set to “encryptMd5hash.” This will confirm APP CHAP authentication and MD5 hashing features for APP sessions are configured between peers, if this is not the case, then this is a finding. The only exception would be if the CSS DNS administrator uses an IPSEC VPN between each peer couple. Review the IPSEC VPN with the CSS DNS administrator and validate the IPSEC VPN is configured between peers, if this is not the case, then this is a finding.
Fix Text
The command, show app session, displays that the authentication type is not set to authChallenge and the encryption type is not set to encryptMd5hash.
Additional Identifiers
Rule ID: SV-4512r1_rule
Vulnerability ID: V-4512
Group Title: CSS DNS does not cryptographically authenticate.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |