Check: IBMZ-VM-001130
IBM zVM STIG:
IBMZ-VM-001130
(in version v1 r0.1)
Title
The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCP/IP DATA configuration. (Cat II impact)
Discussion
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercepted without the resolver's knowledge, or resource records could have been removed, which would result in query failure or DoS. Data origin authentication must be performed to thwart these types of attacks. Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching Domain Name System (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host/service names and network addresses provide other means to enable clients to verify the authenticity of response data. This is not applicable if DNSSEC is not implemented on the local network.
Check Content
Examine the TCP/IP DATA configuration file. If there is no “NSINTERADDR” statement in the TCP/IP DATA configuration file, this is a finding.
Fix Text
Configure the “NSINTERADDR” statement in the TCP/IP DATA configuration file to an appropriate address.
Additional Identifiers
Rule ID:
Vulnerability ID: IBMZ-VM-001130
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002465 |
The information system requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. |
Controls
Number | Title |
---|---|
SC-21 |
Secure Name / Address Resolution Service (Recursive Or Caching Resolver) |