SV-207567r612253_rule
V-207567
SRG-APP-000514-DNS-000075
BIND-9X-001120
CAT I
10
Create new DNSSEC and TSIG keys using a FIPS 180-3 approved cryptographic algorithm that meets or exceeds the strength of SHA256
Verify that the DNSSEC and TSIG keys used by the BIND 9.x implementation are FIPS 180-3 compliant.
If the server is in a classified network, the DNSSEC portion of the requirement is Not Applicable.
DNSSEC KEYS:
Inspect the "named.conf" file and identify all of the DNSSEC signed zone files:
zone "example.com" {
file "signed_zone_file";
};
For each signed zone file identified, inspect the file for the "DNSKEY" records:
86400 DNSKEY 257 3 8 (
<KEY HASH>
) ; KSK;
86400 DNSKEY 256 3 8 (
<KEY HASH>
) ; ZSK;
The fifth field in the above example identifies what algorithm was used to create the DNSKEY.
If the fifth field the KSK DNSKEY is less than “8” (SHA256), this is a finding.
If the algorithm used to create the ZSK is less than “8” (SHA256), this is a finding.
TSIG KEYS:
Inspect the "named.conf" file and identify all of the TSIG key statements:
key tsig_example. {
algorithm hmac-SHA256;
include "tsig-example.key";
};
If each key statement does not use "hmac-SHA256" or a stronger algorithm, this is a finding.
V-207567
False
BIND-9X-001120
Verify that the DNSSEC and TSIG keys used by the BIND 9.x implementation are FIPS 180-3 compliant.
If the server is in a classified network, the DNSSEC portion of the requirement is Not Applicable.
DNSSEC KEYS:
Inspect the "named.conf" file and identify all of the DNSSEC signed zone files:
zone "example.com" {
file "signed_zone_file";
};
For each signed zone file identified, inspect the file for the "DNSKEY" records:
86400 DNSKEY 257 3 8 (
<KEY HASH>
) ; KSK;
86400 DNSKEY 256 3 8 (
<KEY HASH>
) ; ZSK;
The fifth field in the above example identifies what algorithm was used to create the DNSKEY.
If the fifth field the KSK DNSKEY is less than “8” (SHA256), this is a finding.
If the algorithm used to create the ZSK is less than “8” (SHA256), this is a finding.
TSIG KEYS:
Inspect the "named.conf" file and identify all of the TSIG key statements:
key tsig_example. {
algorithm hmac-SHA256;
include "tsig-example.key";
};
If each key statement does not use "hmac-SHA256" or a stronger algorithm, this is a finding.
M
2926