Skip to content

The Infoblox system must validate the binding of the other DNS servers' identity to the DNS information for a server-to-server transaction (e.g., zone transfer).

An XCCDF Rule

Description

<VulnDiscussion>Validation of the binding of the information prevents the modification of information between production and review. The validation of bindings can be achieved, for example, by the use of cryptographic checksums. Validations must be performed automatically. DNSSEC is not effective unless the digital signatures they generate are validated to ensure that the information has not been tampered with and the producer's identity is legitimate.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-233891r621666_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration and time synchronization before starting this procedure. 

1. Navigate to Data Management >> DNS >> Zones tab.  
2. Select a zone and click "Edit". Click on "Zone Transfers" tab and click "Override" for the "Allow Zone Transfers to" section.  
3. Use the radio button to select "Set of ACEs" and the "Add" drop-down to configure a TSIG key.  
4. When complete, click "Save & Close" to save the changes and exit the "Properties" screen.