STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.

DISA Rule

SV-69179r1_rule

Vulnerability Number

V-54933

Group Title

SRG-APP-000516-DNS-000091

Rule Version

SRG-APP-000516-DNS-000091

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove any RRs listed in the internal name server configuration which resolve for external hosts and remove any RRs listed in the external name server configuration which resolve to internal hosts.

For hosts intended to be accessed by both internal and external clients, configure unique IP addresses in each of the internal and external name servers, respective to their location. The perimeter firewall, or other routing device, should handle the Network Address Translation to the true IP address of the destination.

Check Contents

Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NAT'd through the perimeter firewall.

Verify the RRs in the internal name server are not also listed in the external name server.
If there are RRs in the internal name server for hosts also listed in the external name server, and the IP to which it resolves is on the external network, this is a finding.

Verify the RRs in the external name server are not also listed in the internal name server.
If there are RRs in the external name server for hosts also listed in the internal name server, and the IP to which it resolves is on the internal network, this is a finding.

Vulnerability Number

V-54933

Documentable

False

Rule Version

SRG-APP-000516-DNS-000091

Severity Override Guidance

Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NAT'd through the perimeter firewall.

Verify the RRs in the internal name server are not also listed in the external name server.
If there are RRs in the internal name server for hosts also listed in the external name server, and the IP to which it resolves is on the external network, this is a finding.

Verify the RRs in the external name server are not also listed in the internal name server.
If there are RRs in the external name server for hosts also listed in the internal name server, and the IP to which it resolves is on the internal network, this is a finding.

Check Content Reference

M

Target Key

2355

Comments