Skip to content

BIND 9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • A BIND 9.x implementation configured as a caching name server must restrict recursive queries to only the IP addresses and IP address ranges of known supported clients.

    <VulnDiscussion>Any host that can query a resolving name server has the potential to poison the servers name cache or take advantage of other...
    Rule Medium Severity
  • SRG-APP-000158-DNS-000015

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.

    &lt;VulnDiscussion&gt;Server-to-server (zone transfer) transactions are provided by TSIG, which enforces mutual server authentication using a key t...
    Rule High Severity
  • SRG-APP-000158-DNS-000015

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions.

    &lt;VulnDiscussion&gt;Server-to-server (zone transfer) transactions are provided by TSIG, which enforces mutual server authentication using a key t...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000018

    <GroupDescription></GroupDescription>
    Group
  • The TSIG keys used with the BIND 9.x implementation must be owned by a privileged account.

    &lt;VulnDiscussion&gt;Incorrect ownership of a TSIG key file could allow an adversary to modify the file, thus defeating the security objective.&lt...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000018

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000243-DNS-000034

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must be running in a chroot(ed) directory structure.

    &lt;VulnDiscussion&gt;With any network service, there is the potential that an attacker can exploit a vulnerability within the program that allows ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules