SV-207575r612253_rule
V-207575
SRG-APP-000516-DNS-000086
BIND-9X-001142
CAT II
10
Change the permissions of the dnssec-keygen key files:
# chmod 400 <key_file>
If the server is in a classified network, this is Not Applicable.
With the assistance of the DNS Administrator, identify all dnssec-keygen key files that reside on the BIND 9.x server.
An example dnssec-keygen key file will look like:
Kns1.example.com_ns2.example.com.+161+28823.key
OR
Kns1.example.com_ns2.example.com.+161+28823.private
For each key file identified, verify that the key file is owned by "root":
# ls -al
-r-------- 1 root root 77 Jul 1 15:00 Kns1.example.com_ns2.example.com+161+28823.key
If the key files are more permissive than 400, this is a finding.
V-207575
False
BIND-9X-001142
If the server is in a classified network, this is Not Applicable.
With the assistance of the DNS Administrator, identify all dnssec-keygen key files that reside on the BIND 9.x server.
An example dnssec-keygen key file will look like:
Kns1.example.com_ns2.example.com.+161+28823.key
OR
Kns1.example.com_ns2.example.com.+161+28823.private
For each key file identified, verify that the key file is owned by "root":
# ls -al
-r-------- 1 root root 77 Jul 1 15:00 Kns1.example.com_ns2.example.com+161+28823.key
If the key files are more permissive than 400, this is a finding.
M
2926