Check: SRG-APP-000516-DNS-000084
Domain Name System (DNS) SRG:
SRG-APP-000516-DNS-000084
(in versions v4 r1 through v2 r4)
Title
NSEC3 must be used for all internal DNS zones. (Cat II impact)
Discussion
To ensure that RRs associated with a query are really missing in a zone file and have not been removed in transit, the DNSSEC mechanism provides a means for authenticating the nonexistence of an RR. It generates a special RR called an NSEC (or NSEC3) RR that lists the RRTypes associated with an owner name as well as the next name in the zone file. It sends this special RR, along with its signatures, to the resolving name server. By verifying the signature, a DNSSEC-aware resolving name server can determine which authoritative owner name exists in a zone and which authoritative RRTypes exist at those owner names. IETF's design criteria consider DNS data to be public. Confidentiality is not one of the security goals of DNSSEC. DNSSEC is not designed to directly protect against denial-of-service threats but does so indirectly by providing message integrity and source authentication. An artifact of how DNSSEC performs negative responses allows a client to map all the names in a zone (zone walking). A zone which contains zone data that the administrator does not want to be made public should use the NSEC3 RR option for providing authenticated denial of existence. If DNSSEC is enabled for a server, the ability to verify a particular server which may attempt to update the DNS server actually exists. This is done through the use of NSEC3 records to provide an "authenticated denial of existence" for specific systems whose addresses indicate that they lie within a particular zone.
Check Content
Review the zone file's configuration for internal zones and confirm the NSEC3 RR option is used to provide authenticated denial of existence. If the NSEC3 RR option is not used for internal zones, this is a finding.
Fix Text
Configure all internal zones to use the NSEC3 RR option for authenticated denial of existence.
Additional Identifiers
Rule ID: SV-205229r961863_rule
Vulnerability ID: V-205229
Group Title: SRG-APP-000516
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |