SV-207589r612253_rule
V-207589
SRG-APP-000516-DNS-000111
BIND-9X-001410
CAT II
10
Change the ownership of the ZSK private key to the root account.
# chown root <key_file>
If the server is in a classified network, this is Not Applicable.
Note: This check only verifies for ZSK key file ownership. Permissions for key files are required under V-72451, BIND-9X-001132 and V-72461, BIND-9X-001142.
For each signed zone file, identify the ZSK "key id" number:
# cat <signed_zone_file> | grep -i "zsk"
ZSK; alg = ECDSAP256SHA256; key id = 22335
Using the ZSK "key id", identify the private ZSK.
Kexample.com.+008+22335.private
Verify that the private ZSK is owned by root:
# ls -l <ZSK_key_file>
-r------- 1 root root 1776 Jul 3 17:56 Kexample.com.+008+22335.private
If the key file is not owned by root, this is a finding.
V-207589
False
BIND-9X-001410
If the server is in a classified network, this is Not Applicable.
Note: This check only verifies for ZSK key file ownership. Permissions for key files are required under V-72451, BIND-9X-001132 and V-72461, BIND-9X-001142.
For each signed zone file, identify the ZSK "key id" number:
# cat <signed_zone_file> | grep -i "zsk"
ZSK; alg = ECDSAP256SHA256; key id = 22335
Using the ZSK "key id", identify the private ZSK.
Kexample.com.+008+22335.private
Verify that the private ZSK is owned by root:
# ls -l <ZSK_key_file>
-r------- 1 root root 1776 Jul 3 17:56 Kexample.com.+008+22335.private
If the key file is not owned by root, this is a finding.
M
2926