STIGQter STIGQter: STIG Summary: BIND 9.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

On a BIND 9.x server all authoritative name servers for a zone must have the same version of zone information.

DISA Rule

SV-207596r612253_rule

Vulnerability Number

V-207596

Group Title

SRG-APP-000516-DNS-000088

Rule Version

BIND-9X-001613

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the zone file.

Update the SOA record serial number.

Check Contents

Verify that the SOA record is at the same version for all authoritative servers for a specific zone.

With the assistance of the DNS administrator, identify each name server that is authoritative for each zone.

Inspect each zone file that the server is authoritative for and identify the following:

example.com. 86400 IN SOA ns1.example.com. root.example.com. (17760704;serial)

If the SOA "serial" numbers are not identical on each authoritative name server, this is a finding.

Vulnerability Number

V-207596

Documentable

False

Rule Version

BIND-9X-001613

Severity Override Guidance

Verify that the SOA record is at the same version for all authoritative servers for a specific zone.

With the assistance of the DNS administrator, identify each name server that is authoritative for each zone.

Inspect each zone file that the server is authoritative for and identify the following:

example.com. 86400 IN SOA ns1.example.com. root.example.com. (17760704;serial)

If the SOA "serial" numbers are not identical on each authoritative name server, this is a finding.

Check Content Reference

M

Target Key

2926

Comments