An authoritative name server must be configured to enable DNSSEC Resource Records.

From Domain Name System (DNS) Security Requirements Guide

Part of SRG-APP-000516-DNS-000089

Associated with: CCI-000366

SV-69177r1_rule An authoritative name server must be configured to enable DNSSEC Resource Records.

Vulnerability discussion

The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. In DNSSEC, trust in the public key (for signature verification) of the source is established not by going to a third party or a chain of third parties (as in public key infrastructure [PKI] chaining), but by starting from a trusted zone (such as the root zone) and establishing the chain of trust down to the current source of response through successive verifications of signature of the public key of a child by its parent. The public key of the trusted zone is called the trust anchor. After authenticating the source, the next process DNSSEC calls for is to authenticate the response. DNSSEC mechanisms involve two main processes: sign and serve, and verify signature.Before a DNSSEC-signed zone can be deployed, a name server must be configured to enable DNSSEC processing.

Check content

Check the DNS configuration to ensure DNSSEC Resource Records has been enabled. If the name server is not configured with DNSSEC enabled, this is a finding.

Fix text

Configure the name server with DNSSEC enabled.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer