SV-207561r612253_rule
V-207561
SRG-APP-000158-DNS-000015
BIND-9X-001100
CAT I
10
Configure the BIND 9.x server to use TSIG keys.
Add a key statement to the "named.conf" file for TSIG that is being used:
key tsig_example. {
algorithm hmac-SHA1;
include "tsig-example.key";
};
Add key statements to the allow-transfer statements on a master name server:
allow-transfer { key tsig_example.; };
Add key statements to the server statements on a secondary name server:
server <ip_address> {
keys { tsig_example };
};
Restart the BIND 9.x process.
If zone transfers are disabled with the "allow-transfer { none; };" directive, this is Not Applicable.
If the server is in a classified network, this is Not Applicable.
Verify that the BIND 9.x server is configured to uniquely identify a name server before responding to a zone transfer.
Inspect the "named.conf" file for the presence of TSIG key statements:
On the master name server, this is an example of a configured key statement:
key tsig_example. {
algorithm hmac-SHA1;
include "tsig-example.key";
};
zone "disa.mil" {
type master;
file "db.disa.mil";
allow-transfer { key tsig_example.; };
};
On the slave name server, this is an example of a configured key statement:
key tsig_example. {
algorithm hmac-SHA1;
include "tsig-example.key";
};
server <ip_address> {
keys { tsig_example };
};
zone "disa.mil" {
type slave;
masters { <ip_address>; };
file "db.disa.mil";
};
If a master name server does not have a key defined in the “allow-transfer” block, this is a finding.
If a secondary name server does not have a server statement that contains a "keys" sub statement, this is a finding.
V-207561
False
BIND-9X-001100
If zone transfers are disabled with the "allow-transfer { none; };" directive, this is Not Applicable.
If the server is in a classified network, this is Not Applicable.
Verify that the BIND 9.x server is configured to uniquely identify a name server before responding to a zone transfer.
Inspect the "named.conf" file for the presence of TSIG key statements:
On the master name server, this is an example of a configured key statement:
key tsig_example. {
algorithm hmac-SHA1;
include "tsig-example.key";
};
zone "disa.mil" {
type master;
file "db.disa.mil";
allow-transfer { key tsig_example.; };
};
On the slave name server, this is an example of a configured key statement:
key tsig_example. {
algorithm hmac-SHA1;
include "tsig-example.key";
};
server <ip_address> {
keys { tsig_example };
};
zone "disa.mil" {
type slave;
masters { <ip_address>; };
file "db.disa.mil";
};
If a master name server does not have a key defined in the “allow-transfer” block, this is a finding.
If a secondary name server does not have a server statement that contains a "keys" sub statement, this is a finding.
M
2926