BIND-9X-001041 - The BIND 9.x server implementation must be configured with a channel to send audit records to a local file.

Information

DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion detection, and forensics. Ensuring that the DNS transaction logs are recorded on the local system will provide the capability needed to support these actions.

Solution

Edit the 'named.conf' file and add the following:

logging {
channel local_file_channel {
file 'path_name' versions 3;
print-time yes;
print-severity yes;
print-category yes;
};
category category_name { local_file_channel; };
};

Restart the BIND 9.x process.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V2R3_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(2), CAT|III, CCI|CCI-001348, Rule-ID|SV-207547r879582_rule, STIG-ID|BIND-9X-001041, STIG-Legacy|SV-87017, STIG-Legacy|V-72393, Vuln-ID|V-207547

Plugin: Unix

Control ID: 246cf9c7638b0f83a86b24079d0c56dd64519f5f01b819f3f666c268c172a9a0