7.2 Enable DNSSEC Validation - dnssec-enable

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

DNS Security Extensions or DNSSEC for short provides authentication of the name servers through public key cryptography. With DNSSEC, the name server signs its responses with its private key. This allows other name servers that have the public key of the name server to verify the integrity and authenticity of the response. DNSSEC also provides for signing of public keys so that delegated sub-domains may have their keys signed by a higher-level authority. This creates a chain of trust so that any name server that trusts the public key of the higher level signing authority can trust the signed key. It is recommended that DNSSEC be enabled and be configured to validate domains that are signed. DNSSEC and validation are enabled via the options dnssec-enable and dnssec-validation, respectively.

Rationale:

DNSSEC reliably authenticates DNS responses to prevent the DNS spoofing and cache poisoning attacks.

Solution

Perform the following for remediation:

- Check the BIND configuration files, and in the global options set the two options dnssec-enable and dnssec-validation to yes as shown below:

dnssec-enable yes
dnssec-validation yes

- Restart the named server.

Default Value:

DNSSEC and DNSSEC validation are enabled by default.

See Also

https://benchmarks.cisecurity.org/downloads/show-single/?file=bind.300

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-20

Plugin: Unix

Control ID: debf0916bd61f65053da7a4f9eb2e1f52660b2f9198ce31c33ca1b3d5d1c6ae5