Microsoft Windows Server Domain Name System (DNS) STIG Version Comparison
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
Comparison
There are 42 differences between versions v1 r0.1 (July 25, 2023) (the "left" version) and v1 r1 (Jan. 18, 2024) (the "right" version).
Check WDNS-22-000012 was removed from the benchmark in the "right" version. The text below reflects the old wording.
This check's original form is available here.
Text Differences
Title
The Windows 2022 DNS Server with a caching name server role must be secured against pollution by ensuring the authenticity and integrity of queried records.
Check Content
Note: Sinkhole name servers host records that are manually added and for which the name server is not authoritative. It is configured and intended to block resolvers from reaching a destination by directing the query to a sinkhole. If the sinkhole name server is not authoritative for any zones and serves only as a caching/forwarding name server, this check is not applicable. The non-Active Directory (AD)-integrated, standalone, caching Windows 2022 DNS Server must be configured to be DNSSEC aware. When performing caching and lookups, the caching name server must be able to obtain a zone signing key (ZSK) DNSKEY record and corresponding RRSIG record for the queried record. It will use this information to compute the hash for the hostname being resolved. The caching name server decrypts the RRSIG record for the hostname being resolved with the zone's ZSK to get the RRSIG record hash. The caching name server compares the hashes and ensures they match. If the non-AD-integrated, standalone, caching Windows 2022 DNS Server is not configured to be DNSSEC aware, this is a finding.
Discussion
A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers that respond with incorrect information. Once a name server has been poisoned, legitimate clients may be directed to nonexistent hosts (which constitutes a denial of service) or hosts that masquerade as legitimate ones to obtain sensitive data or passwords. To guard against poisoning, name servers authoritative for .mil domains should be separated functionally from name servers that resolve queries on behalf of internal clients. Organizations may achieve this separation by dedicating machines to each function or, if possible, by running two instances of the name server software on the same machine: one for the authoritative function and the other for the resolving function. In this design, each name server process may be bound to a different IP address or network interface to implement the required segregation. Windows 2022 DNS Servers with a caching name server role must be secured against pollution by ensuring the authenticity and integrity of queried records are verified before any data is cached.
Fix
Implement DNSSEC on all non-AD-integrated, standalone, caching Windows 2022 DNS Servers to ensure the caching server validates signed zones when resolving and caching.