This information is provided as part of the Lynis community project. It is related to Lynis control NETW-2705 and should be considered as-is and without guarantees. Any advice and commands should be tested before implementing them in production environments.
How to solve
Nowadays, most systems are connected. At least via the internal network, but often also via the internet. An important requisite in this interconnected web of systems is the ability to use a naming convention, like names for hosts, or names for websites. By using DNS (Domain Name System), we can translate between names and IP addresses.
Many systems have a weak configuration when it comes to this name translation. It is common to find a missing fallback system, when the primary DNS server is not available. Another issue is that one or more of the name servers listed in /etc/resolv.conf are not even accessible or functioning. With this Lynis control the connectivity is tested.
Depending on your system, you might need to make changes in your /etc/resolv.conf file, or otherwise. Debian based systems might use /etc/network/interfaces to define name servers (dns-nameservers 126.96.36.199 188.8.131.52 184.108.40.206), or /etc/resolvconf/resolv.conf.d/tail.
- DNS tuning for performance and resilience (Tips to enhance the DNS configuration of Linux systems)
Need more details?
Consider an upgrade to Lynis Enterprise to receive more guidance. The Enterprise version helps to you with daily health checks of your environment, learn in-depth system hardening, and resources to protect your systems better.See demo
Lynis is a technical security auditing tool for Unix flavors like Linux, macOS, AIX, Solaris, and *BSD. It is open source software and free to use. Typical usage include system hardening, compliance testing, and vulnerability scanning. The project has an active community, including development via GitHub.
Do you need to collect data from multiple systems or compliance reporting? Lynis Enterprise uses Lynis to collect the data and make your work easier.
Benefits: automate security audits, detailed reporting, compliance testing.
- Centralized management
- Improvement plan with priorities
- Predefined policies
- Integration (API)
- Improvement snippets for tools like Ansible, Chef, Cfengine, Puppet, and SaltStack