The DNS server implementation must authenticate the other DNS server before responding to a server-to-server transaction.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-205203SRG-APP-000394-DNS-000049SV-205203r961503_ruleCCI-001958medium
Description
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage devices. It is an additional layer of authentication ensuring only specific pre-authorized devices can access the system. This requirement applies to server-to-server (zone transfer) transactions only and is provided by TSIG/SIG(0), which enforces mutual server authentication using a key that is unique to each server pair (TSIG) or using PKI-based authentication (SIG(0)).
STIGDate
Domain Name System (DNS) Security Requirements Guide2024-07-02

Details

Check Text (C-205203r961503_chk)

Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.

Fix Text (F-5470r392523_fix)

Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.