SV-207573r612253_rule
V-207573
SRG-APP-000516-DNS-000086
BIND-9X-001140
CAT II
10
Change the ownership of the keys to the root account.
# chown root <key_file>.
If the server is in a classified network, this is Not Applicable.
With the assistance of the DNS Administrator, identify all dnssec-keygen key files that reside on the BIND 9.x server.
An example dnssec-keygen key file will look like:
Kns1.example.com_ns2.example.com.+161+28823.key
OR
Kns1.example.com_ns2.example.com.+161+28823.private
For each key file identified, verify that the key file is owned by "root":
# ls -al
-r-------- 1 root root 77 Jul 1 15:00 Kns1.example.com_ns2.example.com+161+28823.key
If the key file(s) are not owned by root, this is a finding.
V-207573
False
BIND-9X-001140
If the server is in a classified network, this is Not Applicable.
With the assistance of the DNS Administrator, identify all dnssec-keygen key files that reside on the BIND 9.x server.
An example dnssec-keygen key file will look like:
Kns1.example.com_ns2.example.com.+161+28823.key
OR
Kns1.example.com_ns2.example.com.+161+28823.private
For each key file identified, verify that the key file is owned by "root":
# ls -al
-r-------- 1 root root 77 Jul 1 15:00 Kns1.example.com_ns2.example.com+161+28823.key
If the key file(s) are not owned by root, this is a finding.
M
2926