Skip to content

BIND 9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-DNS-000112

    <GroupDescription></GroupDescription>
    Group
  • On the BIND 9.x server the private keys corresponding to both the ZSK and the KSK must not be kept on the BIND 9.x DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000086

    <GroupDescription></GroupDescription>
    Group
  • The two files generated by the BIND 9.x server dnssec-keygen program must be owned by the root account, or deleted, after they have been copied to the key file in the name server.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000086

    <GroupDescription></GroupDescription>
    Group
  • The two files generated by the BIND 9.x server dnssec-keygen program must be group owned by the server administrator account, or deleted, after they have been copied to the key file in the name server.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000086

    <GroupDescription></GroupDescription>
    Group
  • Permissions assigned to the dnssec-keygen keys used with the BIND 9.x implementation must enforce read-only access to the key owner and deny access to all other users.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000096

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server signature generation using the KSK must be done off-line, using the KSK-private key stored off-line.

    &lt;VulnDiscussion&gt;The private key in the KSK key pair must be protected from unauthorized access. The private key should be stored off-line (wi...
    Rule High Severity
  • SRG-APP-000213-DNS-000024

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must maintain the integrity and confidentiality of DNS information while it is being prepared for transmission, in transmission, and in use and t must perform integrity verification and data origin verification for all DNS information.

    &lt;VulnDiscussion&gt;DNSSEC is required for securing the DNS query/response transaction by providing data origin authentication and data integrity...
    Rule High Severity
  • SRG-APP-000214-DNS-000025

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must provide the means to indicate the security status of child zones.

    &lt;VulnDiscussion&gt;If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...
    Rule Medium Severity
  • SRG-APP-000214-DNS-000079

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server validity period for the RRSIGs covering the DS RR for zones delegated children must be no less than two days and no more than one week.

    &lt;VulnDiscussion&gt;The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000099

    <GroupDescription></GroupDescription>
    Group
  • The core BIND 9.x server files must be owned by the root or BIND 9.x process account.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have d...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000099

    <GroupDescription></GroupDescription>
    Group
  • The core BIND 9.x server files must be group owned by a group designated for DNS administration only.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have d...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules