3.1 Ignore Erroneous or Unwanted Queries - RFC 1918 10/8; addresses

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

BIND can be configured to ignore requests originating from specified network segments. This is accomplished by implementing the blackhole option in named.conf. It is recommended that this feature be implemented to ignore requests that originate outside of expected network segments.

Rationale:

By ignoring traffic that originates from unexpected networks, the server's exposure to malicious entities is reduced.

Solution

Add a blackhole option for multicast and link local addresses, and all private RFC 1918 addresses that are not being used.

blackhole {
// Private RFC 1918 addresses
10/8; 192.168/16; 172.16/12;
// Multicast
224/8;
// Link Local
169.254/16;
};

Default Value:

No networks are blackhole'd by default.

See Also

https://benchmarks.cisecurity.org/downloads/show-single/?file=bind.300

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7

Plugin: Unix

Control ID: 2c83398225b83e417c623278ccac4744e74cc858154feaac9a4dd749a0619035