STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

DISA Rule

SV-69203r1_rule

Vulnerability Number

V-54957

Group Title

SRG-APP-000516-DNS-000110

Rule Version

SRG-APP-000516-DNS-000110

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DNS server to use a random port for outgoing DNS messages.

Check Contents

Review the DNS configuration. Determine if a static port is being used to send outgoing DNS messages or whether it is configured to use a random port.

If the DNS configuration specifies a static port to be used for outgoing DNS messages rather than a random port, this is a finding.

Vulnerability Number

V-54957

Documentable

False

Rule Version

SRG-APP-000516-DNS-000110

Severity Override Guidance

Review the DNS configuration. Determine if a static port is being used to send outgoing DNS messages or whether it is configured to use a random port.

If the DNS configuration specifies a static port to be used for outgoing DNS messages rather than a random port, this is a finding.

Check Content Reference

M

Target Key

2355

Comments