From BIND 9.x Security Technical Implementation Guide
Part of SRG-APP-000516-DNS-000101
Associated with: CCI-000366
DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal clients). DNS servers with an external role only process name/address resolution information requests from clients external to the organization (i.e., on the external networks, including the Internet). The set of clients that can access an authoritative DNS server in a particular role is specified by the organization using address ranges, explicit access control lists, etc. In order to protect internal DNS resource information, it is important to isolate the requests to internal DNS servers.
Severity Override Guidance:
If the internal and external views are on separate network segments, this finding may be downgraded to a CAT II.
If the BIND 9.x name server is not configured for split DNS, this is Not Applicable.
Verify that the BIND 9.x server is configured to use separate views and address space for internal and external DNS operations when operating in a split configuration.
Inspect the "named.conf" file for the following:
view "internal" {
match-clients {
Edit the "named.conf" file. Configure the internal and external view statements to use separate network segments. Configure all internal view statements to be listed before any external view statement. Restart the BIND 9.x process.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer