The read and write access to a TSIG key file used by a BIND 9.x server must be restricted to only the account that runs the name server software.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-272375 | BIND-9X-001180 | SV-272375r1123858_rule | CCI-000186 | medium |
| Description | ||||
| Weak permissions of a TSIG key file could allow an adversary to modify the file, thus defeating the security objective. | ||||
| STIG | Date | |||
| BIND 9.x Security Technical Implementation Guide | 2026-02-25 | |||
Details
Check Text (C-272375r1123858_chk)
Verify permissions assigned to the TSIG keys enforce read-write access to the key owner and deny access to group or system users.
With the assistance of the DNS administrator, determine the location of the TSIG keys used by the BIND 9.x implementation:
# ls -al <TSIG_Key_Location>
-rw-r-----. 1 root named 76 May 10 20:35 tsig-example.key
If the key files are more permissive than 640, this is a finding.
Fix Text (F-76332r1123857_fix)
Change the permissions of the TSIG key files:
# chmod 640 <TSIG_key_file>