From BIND 9.x Security Technical Implementation Guide
Part of SRG-APP-000516-DNS-000102
Associated with: CCI-000366
A potential vulnerability of DNS is that an attacker can poison a name servers cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers that respond with incorrect information. The DNS architecture needs to maintain one name server whose zone records are correct and the cache is not poisoned, in this effort the authoritative name server may not forward queries, one of the ways to prevent this, the root hints file is to be deleted.
If this server is a caching name server, this is Not Applicable.
Ensure there is not a local root zone on the name server.
Inspect the "named.conf" file for the following:
zone "." IN {
type hint;
file "
Remove the local root zone file from the name server.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer