The DNS server implementation must authenticate the other DNS server before responding to a server-to-server transaction.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-205203 | SRG-APP-000394-DNS-000049 | SV-205203r961503_rule | CCI-001958 | medium |
| Description | ||||
| Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage devices. It is an additional layer of authentication ensuring only specific pre-authorized devices can access the system. This requirement applies to server-to-server (zone transfer) transactions only and is provided by TSIG/SIG(0), which enforces mutual server authentication using a key that is unique to each server pair (TSIG) or using PKI-based authentication (SIG(0)). | ||||
| STIG | Date | |||
| Domain Name System (DNS) Security Requirements Guide | 2024-07-02 | |||
Details
Check Text (C-205203r961503_chk)
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Fix Text (F-5470r392523_fix)
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.