1. Home
  2. Security Hardening
  3. DISA Bind 9.x STIG V2R2
  4. BIND-9X-001017 – The BIND 9.x server implementation must not be configured with a channel to send audit records to null.

BIND-9X-001017 – The BIND 9.x server implementation must not be configured with a channel to send audit records to null.

Details

DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion detection, and forensics. Ensuring that the DNS transaction logs are recorded on the local system will provide the capability needed to support these actions. Sending DNS transaction data to the null channel would cause a loss of important data.

Solution

Edit the ‘named.conf’ file.

Remove any instance of the following:

category null { null; };

Restart the BIND 9.x process.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles