Skip to content

BIND 9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.

    <VulnDiscussion>Server-to-server (zone transfer) transactions are provided by TSIG, which enforces mutual server authentication using a key t...
    Rule High Severity
  • SRG-APP-000158-DNS-000015

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must utilize separate TSIG key-pairs when securing server-to-server transactions.

    &lt;VulnDiscussion&gt;Server-to-server (zone transfer) transactions are provided by TSIG, which enforces mutual server authentication using a key t...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000018

    <GroupDescription></GroupDescription>
    Group
  • The TSIG keys used with the BIND 9.x implementation must be owned by a privileged account.

    &lt;VulnDiscussion&gt;Incorrect ownership of a TSIG key file could allow an adversary to modify the file, thus defeating the security objective.&lt...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000018

    <GroupDescription></GroupDescription>
    Group
  • The TSIG keys used with the BIND 9.x implementation must be group owned by a privileged account.

    &lt;VulnDiscussion&gt;Incorrect ownership of a TSIG key file could allow an adversary to modify the file, thus defeating the security objective.&lt...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000019

    <GroupDescription></GroupDescription>
    Group
  • The read and write access to a TSIG key file used by a BIND 9.x server must be restricted to only the account that runs the name server software.

    &lt;VulnDiscussion&gt;Weak permissions of a TSIG key file could allow an adversary to modify the file, thus defeating the security objective.&lt;/V...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules