Skip to content

When using non-Grid DNS servers for zone transfers, each name server must use TSIG to uniquely identify the other server.

An XCCDF Rule

Description

<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions only and is provided by TSIG, which enforces mutual server authentication using a key that is unique to each server pair (TSIG), thus uniquely identifying the other server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-233899r621666_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

1. Navigate to Data Management >> DNS >> Zones tab.  
2. Select a zone and click "Edit".
3. Click on the "Zone Transfers" tab and click "Override" for the "Allow Zone Transfers to" section.
4. Use the radio button to select "Set of ACEs" and the "Add" drop-down to configure a TSIG key. 
5. Verify that both the Infoblox and other DNS server have the identical TSIG configuration. 
6. Verify that both the Infoblox and other DNS server have time synchronized properly. Note that TSIG relies on both key and time synchronization. TSIG will fail if the local clocks on both names are not synchronized.