home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 277 of 523   
   Ben Ritchey to All   
   US-Cert Alert   
   28 Aug 15 17:23:12   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   TA15-240A: Controlling Outbound DNS Access   
   08/28/2015 01:31 PM EDT   
      
      
   Original release date: August 28, 2015   
      
   Systems Affected   
   Networked systems   
      
   Overview   
   US-CERT has observed an increase in Domain Name System (DNS) traffic from   
   client systems within internal networks to publically hosted DNS servers.   
   Direct client access to Internet DNS servers, rather than controlled access   
   through enterprise DNS servers, can expose an organization to unnecessary   
   security risks and system inefficiencies. This Alert provides recommendations   
   for improving security related to outbound DNS queries and responses.   
      
   Description   
   Client systems and applications may be configured to send DNS requests to   
   servers other than authorized enterprise DNS caching name servers (also called   
   resolving, forwarding or recursive name servers). This type of configuration   
   poses a security risk and may introduce inefficiencies to an organization.   
      
   Impact   
   Unless managed by perimeter technical solutions, client systems and   
   applications may connect to systems outside the enterprise’s administrative   
   control for DNS resolution. Internal enterprise systems should only be   
   permitted to initiate requests to and receive responses from approved   
   enterprise DNS caching name servers. Permitting client systems and   
   applications to connect directly to Internet DNS infrastructure introduces   
   risks and inefficiencies to the organization, which include:   
      
   Bypassed enterprise monitoring and logging of DNS traffic; this type of   
   monitoring is an important tool for detecting potential malicious network   
   activity.   
   Bypassed enterprise DNS security filtering (sinkhole/redirect or   
   blackhole/block) capabilities; this may allow clients to access malicious   
   domains that would otherwise be blocked.   
   Client interaction with compromised or malicious DNS servers; this may cause   
   inaccurate DNS responses for the domain requested (e.g., the client is sent to   
   a phishing site or served malicious code).   
   Lost protections against DNS cache poisoning and denial-of-service attacks.   
   The mitigating effects of a tiered or hierarchical (e.g., separate internal   
   and external DNS servers, split DNS, etc.) DNS architecture used to prevent   
   such attacks are lost.   
   Reduced Internet browsing speed since enterprise DNS caching would not be   
   utilized.   
   Solution   
   Implement the recommendations below to provide a more secure and efficient DNS   
   infrastructure. Please note that these recommendations focus on improving the   
   security of outbound DNS query or responses and do not encompass all DNS   
   security best practices.   
      
   Configure operating systems and applications (including lower-tier DNS servers   
   intended to forward queries to controlled enterprise DNS servers) to use only   
   authorized DNS servers within the enterprise for outbound DNS resolution.   
   Configure enterprise perimeter network devices to block all outbound User   
   Datagram Protocol (UDP) and Transmission Control Protocol (TCP) traffic to   
   destination port 53, except from specific, authorized DNS servers (including   
   both authoritative and caching/forwarding name servers).   
   Additionally, filtering inbound destination port 53 TCP and UDP traffic to   
   only allow connections to authorized DNS servers (including both authoritative   
   and caching/forwarding name servers) will provide additional protections.   
   Refer to Section 12 of the NIST Special Publication 800-81-2 for guidance when   
   configuring enterprise recursive DNS resolvers. [1]   
   References   
   Secure Domain Name System (DNS) Deployment Guide   
   Revision History   
   August 28, 2015: Initial Release   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or have questions, please send an email to info@us-cert.gov. Do not reply to   
   this message since this email was sent from a notification-only address that   
   is not monitored. To ensure you receive future US-CERT products, please add   
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
   === Cut ===   
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca