STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

The DNS server implementation must be configured to prohibit or restrict unapproved ports and protocols.

DISA Rule

SV-69043r1_rule

Vulnerability Number

V-54797

Group Title

SRG-APP-000142-DNS-000014

Rule Version

SRG-APP-000142-DNS-000014

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DNS implementation for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port.

Check Contents

Review the DNS system configuration to ensure the system is configured for incoming traffic only on UDP/53 and TCP/53 and outgoing DNS traffic sent from a random port rather than the DNS software's default port.

If the DNS implementation is not configured for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port, this is a finding.

Vulnerability Number

V-54797

Documentable

False

Rule Version

SRG-APP-000142-DNS-000014

Severity Override Guidance

Review the DNS system configuration to ensure the system is configured for incoming traffic only on UDP/53 and TCP/53 and outgoing DNS traffic sent from a random port rather than the DNS software's default port.

If the DNS implementation is not configured for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port, this is a finding.

Check Content Reference

M

Target Key

2355

Comments