Check: SRG-APP-000420-DNS-000053
Domain Name System (DNS) SRG:
SRG-APP-000420-DNS-000053
(in versions v4 r1 through v2 r4)
Title
A DNS server implementation must provide data origin artifacts for internal name/address resolution queries. (Cat II impact)
Discussion
The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data origin authentication, establishing trust in the source. This requirement enables remote clients to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service. A DNS server is an example of an information system providing name/address resolution service. Digital signatures and cryptographic keys are examples of additional artifacts. DNS resource records are examples of authoritative data. Applications other than the DNS to map between host/service names and network addresses must provide other means to assure the authenticity and integrity of response data. In the case of DNS, employ DNSSEC to provide an additional data origin and integrity artifacts along with the authoritative data the system returns in response to DNS name/address resolution queries.
Check Content
Review the DNS server implementation configuration to determine if the DNS server provides data origin artifacts for internal name/address resolution queries. If the DNS server does not provide these data origin artifacts, this is a finding.
Fix Text
Configure the DNS server to provide data origin artifacts for internal name/address resolution queries.
Additional Identifiers
Rule ID: SV-205206r987695_rule
Vulnerability ID: V-205206
Group Title: SRG-APP-000420
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
CCI-002463 |
Provide data origin artifacts for internal name/address resolution queries. |