NSEC3 must be used for all DNSSEC signed zones.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-233862SRG-APP-000516-DNS-000084IDNS-8X-400004SV-233862r1082612_rule2025-03-111
Description
To ensure that resource records (RRs) associated with a query are really missing in a zone file and have not been removed in transit, the DNSSEC mechanism provides a means for authenticating the nonexistence of an RR. It generates a special RR called an NSEC (or NSEC3) RR that lists the RRTypes associated with an owner name as well as the next name in the zone file. It sends this special RR, along with its signatures, to the resolving name server. By verifying the signature, a DNSSEC-aware resolving name server can determine which authoritative owner name exists in a zone and which authoritative RRTypes exist at those owner names. The Internet Engineering Task Force's (IETF's) design criteria consider DNS data to be public. Confidentiality is not one of the security goals of DNSSEC. DNSSEC is not designed to directly protect against denial-of-service threats but does so indirectly by providing message integrity and source authentication. An artifact of how DNSSEC performs negative responses allows a client to map all the names in a zone (zone walking). A zone that contains zone data the administrator does not want to be made public must use the NSEC3 RR option for providing authenticated denial of existence. If DNSSEC is enabled for a server, the ability to verify a particular server that may attempt to update the DNS server actually exists. This is done through the use of NSEC3 records to provide an "authenticated denial of existence" for specific systems whose addresses indicate that they lie within a particular zone. DNSSEC is intended for third-party authenticity determination. Attempting to utilize DNSSEC internally was never an intended use case as it would require every consumer to have a third-party validating resolver installed along with a mechanism for periodic trust anchor distribution/update. It is recommended for external zones only.
ℹ️ Check
Note: For Infoblox DNS systems on a classified network, this requirement is Not Applicable. 1. Review the zone configuration and confirm that, if DNSSEC is enabled NSEC3 is used. 2. Navigate to Data Management >> DNS >> Grid DNS Properties. Toggle Advanced Mode and review the "DNSSEC" tab. 3. Ensure "Resource Record Type for Nonexistent Proof" is set to NSEC3. 4. When complete, click "Cancel" to exit the "Properties" screen. 5. Review zone data or use Global Search string ".". Type "Equals NSEC Record" to verify no undesired NSEC records exist. If NSEC records exist in an active zone, or NSEC3 is not configured, this is a finding.
✔️ Fix
1. Navigate to Data Management >> DNS >> Grid DNS Properties. 2. Toggle Advanced Mode and edit the "DNSSEC" tab. 3. Ensure "Resource Record Type for Nonexistent Proof" is set to NSEC3. 4. Re-sign all DNSSEC zones that previously used NSEC.