10 things you should know about securing DNS

Dr. Thomas W. Shinder

 

Introduction

The Domain Name System (DNS) is used for resolving host names to IP addresses on the Internet and on private TCP/IP-based networks. DNS is subject to exploits and attacks, but you can make it more secure. Here are 10 strategies for securing your DNS servers.

 

1. Use DNS forwarders

A DNS forwarder is a DNS server that performs DNS queries on behalf of another DNS server. The primary reasons to use a DNS forwarder are to offload processing duties from the DNS server forwarding the query to the forwarder and to benefit from the potentially larger DNS cache on the DNS forwarder.

Another benefit of using a DNS forwarder is that it prevents the DNS server forwarding the requests from interacting with Internet DNS servers. This is especially important when your DNS server is hosting your internal domain DNS resource records. Instead of allowing your internal DNS servers to perform recursion and contacting DNS servers itself, configure the internal DNS server to use a forwarder for all domains for which it is not authoritative.

 

2. Use caching-only DNS servers

A caching-only DNS server is not authoritative for any DNS domains. It’s configured to perform recursion or use a forwarder. When it receives a response, it caches the result and returns the answer to the system issuing the DNS query to the caching-only DNS server. Over time, the caching-only DNS server can amass a large cache of DNS responses, which can significantly improve DNS response times for DNS clients of that caching-only DNS server.

Caching-only DNS servers can improve security for your organization when used as forwarders that are under your administrative control. Internal DNS servers can be configured to use the caching-only DNS server as their forwarders, and the caching-only DNS server performs recursion on behalf of your internal DNS servers. Using your own caching-only DNS servers as forwarders improves security because you don’t have to depend on your ISP’s DNS servers as forwarders when you’re unsure of their security configuration.

 

3. Use DNS advertisers

A DNS advertiser is a DNS server that resolves queries for domains for which the DNS advertiser is authoritative. For example, if you host publicly available resources for domain.com and corp.com, your public DNS server would be configured with DNS zone files for the domain.com and corp.com domains.

What sets the DNS advertiser apart from any other DNS server hosting DNS zone files is that the DNS advertiser answers queries only for domains for which it is authoritative. The DNS server will not perform recursion for queries to other DNS servers. This prevents anyone from using your public DNS server to resolve names in other domains. This increases security by lessening the risks associated with running a public DNS resolver, which include cache poisoning.

 

4. Use DNS resolvers

A DNS resolver is a DNS server that can perform recursion to resolve names for domains for which that DNS server is not authoritative. For example, you might have a DNS server on your internal network that’s authoritative for your internal network domain, internalcorp.com. When a client on your network uses that DNS server to resolve the name techrepublic.com, that DNS server performs recursion by querying other DNS servers to get the answer.

The difference between this DNS server and a DNS resolver is that a DNS resolver is a DNS server that is dedicated to resolving Internet host names. A resolver could be a caching-only DNS server that isn’t authoritative for any DNS domains. You can make the DNS resolver available to only your internal users, you can make it available only to your external users to provide a secure alternative to using a DNS server outside of your administrative control, or you can allow both internal and external users access to the DNS resolver.

 

5. Protect DNS from cache pollution

DNS cache pollution is an increasingly common problem. Most DNS servers can cache the results of DNS queries before forwarding the response to the host issuing the query. The DNS cache can significantly improve DNS query performance throughout your organization. The problem is that if the DNS server cache is “polluted” with bogus DNS entries, users can subsequently be forwarded to malicious Web sites instead of the sites they intended to visit.

Most DNS servers can be configured to prevent cache pollution. The Windows Server 2003 DNS server is configured to prevent cache pollution by default. If you’re using a Windows 2000 DNS server, you can configure it to prevent cache pollution by opening the Properties dialog box for the DNS server and clicking the Advanced tab. Select the Prevent Cache Pollution check box and restart the DNS server.

 

6. Enable DDNS for secure connections only

Many DNS servers accept dynamic updates, enabling them to register DNS host names and IP addresses for hosts that use DHCP for host IP addressing. DDNS can reduce the administrative overhead for DNS administrators who otherwise would need to manually configure DNS resource records for these hosts, but if unchecked, DDNS updates can pose a security risk. A malicious user can configure a host to dynamically update DNS host records of a file server, Web server, or database server and have connections that are destined to those servers diverted to his machine instead of the intended target. 

You can reduce the risk of malicious DNS updates by requiring secure connections to the DNS server in order to perform the dynamic update. This is easily achieved by configuring your DNS server to use Active Directory integrated zones and requiring secure dynamic updates. All domain members will be able to dynamically update their DNS information in a secure context after you make this change.

 

7. Disable zone transfers

Zone transfers take place between primary and secondary DNS servers. Primary DNS servers that are authoritative for specific domains contain writable DNS zone files that are updated as needed. Secondary DNS servers received a read-only copy of these zone files from primary DNS servers. Secondary DNS servers are used to improve DNS query performance throughout an organization or over the Internet.

However, zone transfers are not limited to only secondary DNS servers. Anyone can issue a DNS query that will cause a DNS server configured to allow zone transfers to dump the entirety of its zone database files. Malicious users can use this information to reconnoiter the naming schema in your organization and attack key infrastructure services. You can prevent this by configuring your DNS servers to deny zone transfer requests or to allow zone transfers only to specific servers in the organization.

 

8. Use firewalls to control DNS access

Firewalls can be used to gain access control over who can connect to your DNS servers. For DNS servers that are used only for internal client queries, configure firewalls to block connections from external hosts to those DNS servers. For DNS servers used as caching-only forwarders, configure firewalls to allow DNS queries only from those DNS servers that use the caching-only forwarders. An especially important firewall policy setting is to block internal users from using the DNS protocol to connect to external DNS servers.

 

9. Set access controls on DNS registry entries

On Windows-based DNS servers, you should configure access controls on the DNS server-related Registry settings so that only the accounts that require access to them are allowed to read or change those Registry settings.

The HKLM\CurrentControlSet\Services\DNS key should be configured to allow only the Administrator and System account access, and these accounts should have Full Control permissions.

 

10. Set access control on DNS file system entries

On Windows-based DNS servers, you should configure access controls on the DNS server-related file system entries so that only the accounts that require access to them are allowed to read or change those files.

The %system_directory%\DNS folder and subfolders should be configured to allow only the system account to access the files, and the system account should be given Full Control permissions.

 

Additional resources

nTechRepublic’s Downloads RSS Feed 

nSign up for our Downloads Weekly Update newsletter

nSign up for our Network Security NetNote

nCheck out all of TechRepublic’s free newsletters

n"Troubleshoot DNS with this flowchart" (TechRepublic download)

n"Ramp up DNS security with these three steps" (TechRepublic article)

n"Strengthen vulnerable spots to improve DNS security" (TechRepublic article)

 

Version history

nVersion: 1.0

nPublished: November 3, 2005

Microsoft Live 全景图

Find and Discover Information:个人信息获取
Live.com(个性化信息门户)
– Windows Live Search(个性化搜索)

Enhance and Deepen Relationships:个人信息管理
– Windows Live Mail(邮件)
– Windows Live Messenger(及时通讯)
– Windows Live Favorites(在线书签)
– Windows Live for mobile devices(Live服务的移动设备支持)

Explore and Find New Interests:社会化网络
– Social Networking(社交网络)
– Windows Live Spaces(Blog)

Protection and Performance:安全与维护
– Windows Live Safety Center(在线安全中心)
– Windows OneCare Live(在线系统维护)
– Integrated protection(Live服务的安全防护)

Microsoft Office Live:中小企业在线发布及管理系统
– Microsoft Office Live Basics(类似于企业Blog)
– Microsoft Office Live Essentials(增加企业邮局以及文档、客户、项目管理等功能)
– Microsoft Office Live Collaboration(增加公司内部网功能)

Xbox Live:Xbox游戏在线服务
– Xbox Live Marketplace(交易中心)
– Ubiquitous voice chat(语音聊天)
– Gamer Profile(玩家档案)
– Xbox Live Arcade on Xbox 360(游戏的在线下载及购买服务)

Microsoft Live中的大部分功能要数月甚至1年以后才会逐渐开放,不过从以上的列表中已经可以看出微软在Live计划所涉猎的范围之广、野心之大。那么多服务的联动,使微软只要把单独的服务作到别人的一半好,就能在市场上立于不败。说Microsoft Live会杀死一大批Web 2.0公司可能是夸大其词,但是反过来说Microsoft Live会在Web 2.0时代占据重要的地位绝不为过。

未来的电视是什么样子的?

记得在很多年前的高中时代,一个兴趣相投的同学和我说起一件事,说国外有人举行有奖比赛,题目是未来的电视应该是什么样子的,结果最终得奖者的答案居然出奇的简单:手电筒。
手电筒,就是你要看电视, 只要有个接近白色平面,你就可以看了,就这么简单。当然,其幕后的技术细节是相当复杂的,譬如信号源、信号转换、发光体、电源等等。因为当时的投影屏幕技术似乎已经非常成熟了,电化教室、录像厅,处处可见,好象也不是很贵。可是为什么这么多年来,我们看到了三、四十英寸的电视机,又有了液晶、等离子的大屏幕平面电视,而投影机依然曲高和寡呢?
投影机,最早叫投影仪,是个更加神秘的名字,英文叫projector。在办公场所、会议室、报告会上最常见到,其种类千奇百怪,有大有小,最大的应该是专业级的Barco,以至于直到现在,我们还把投影机叫做Barco,我看到过最小的是康柏电脑(Compaq Computer)的iPAQ投影机,其大小比家用的应急灯大不了多少,可惜现在的HPQ没能把这产品继续下去。
今天看最新的11月份《PC WORLD》,终于看到了这样一件接近梦幻的产品:

从上面的图中可以看出这款投影机的品牌、大小和接口。它是今年第四季度即将上市的产品,标价为799美元,同档价格的是在BestBuy已经有售的InFocus X2。
这款投影机的卖点在于它的小,小到和普通的傻瓜相机那样,重量只有一磅。如果和相机一起带出去旅游,你就可以和同伴一起回顾一天的旅程,而不用几个脑袋挤在一起抢着看了。它的唯一缺点是不够亮,与目前主流产品1000~2000流明相比,它的250流明就只能在基本全黑的环境下使用了;但也是因为它的不够亮,它的灯泡设计寿命为一万小时,就相当于你一天看5小时,可以看2000天,差不多六年,怎么样?它的出现,将是背投电视的终结。
这里是制造商的产品链接

新版微软入门证书——MCTS第一课: Microsoft Certified Technology Specialists in SQL Server 2005

Get Ready for SQL Server 2005 with Free* Microsoft E-Learning Courses.

Whether you are interested in database administration, database development, or business intelligence, you can access the E-Learning topic you want, when you want it, and learn at your own pace. Each lesson includes hands-on virtual labs and offline functionality. These courses, valued at $99 each won’t be free forever, so sign on today.

In addition, you may consider taking a free Microsoft Skills Assessment to help you meet your Microsoft SQL Server 2005 training goals. You’ll receive a learning roadmap with additional skills resources including instructor-led classroom training and books. Take a skills assessment today.

For more information visit the SQL Server 2005 Learning Resource page.

* Microsoft E-Learning for SQL Server 2005 is free until November 1, 2006.

链接: https://www.microsoftelearning.com/sqlserver2005/