WDNS-CM-000022 - The Windows 2012 DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

All caching name servers must be authoritative for the root zone because, without this starting point, they would have no knowledge of the DNS infrastructure and thus would be unable to respond to any queries. The security risk is that an adversary could change the root hints and direct the caching name server to a bogus root server. At that point, every query response from that name server is suspect, which would give the adversary substantial control over the network communication of the name servers' clients. When authoritative servers are sent queries for zones that they are not authoritative for, and they are configured as a non-caching server (as recommended), they can either be configured to return a referral to the root servers or they can be configured to refuse to answer the query. The recommendation is to configure authoritative servers to refuse to answer queries for any zones for which they are not authoritative. This is more efficient for the server and allows it to spend more of its resources doing what its intended purpose is, answering authoritatively for its zone.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Log on to the authoritative DNS server using the Domain Admin or Enterprise Admin account.

Press Windows Key + R, execute dnsmgmt.msc.
Right-click the DNS server, select 'Properties'.
Select the 'Root Hints' tab.
Remove the root hints from the DNS Manager, the CACHE.DNS file and from Active Directory for name servers outside of the internal network.
Replace the existing root hints with new root hints of internal servers.
If the DNS server is forwarding, click to select the : 'Do not use recursion for this domain' check box on the 'Forwarders' tab in DNS Manager to make sure that the root hints will not be used.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_Server_DNS_V1R14_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-000366, Rule-ID|SV-73045r5_rule, STIG-ID|WDNS-CM-000022, Vuln-ID|V-58615

Plugin: Windows

Control ID: 0cf285da35bbdcaade64fa31e4bfe4f15b6a494e4754892d09adcb8f14d67d8b