From BIND 9.x Security Technical Implementation Guide
Part of SRG-APP-000516-DNS-000110
Associated with: CCI-000366
Hosts that run the name server software should not provide any other services and therefore should be configured to respond to DNS traffic only. Outgoing DNS messages should be sent from a random port to minimize the risk of an attacker's guessing the outgoing message port and sending forged replies.
Verify that the BIND 9.x server does not limit outgoing DNS messages to a specific port.
Inspect the "named.conf" file for the any instance of the "port" flag:
options {
listen-on port 53 {
Edit the "named.conf" file.
Configure the BIND 9.x server to only use the "port" flag with the "listen-on" and "listen-on-v6" statements:
options {
listen-on port 53 {
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer