Route 53 DNS Firewall - Wildcard / CNAME issue

1

We're using DNS firewall and using an allowed list acceptable outbound domains. In some cases where there are multiple subdomains like sec.gov so we use a wildcard *.sec.gov. www.sec.gov is a CNAME record which returns www.sec.gov.edgekey.net. and the subsequent lookup of that fails unless we add that to our allowed list as well. Makes sense. There have a few domains where the target of the CNAME has changed and we can only update after the DNS lookup has failed and we are alerted. I'm just wondering if there is any way to be proactive with this, by somehow allowing the *.sec.gov to cover any CNAME it may encounter.

preguntada hace 2 años925 visualizaciones
1 Respuesta
1

Given that you have no control over the target DNS and you want to have a very strict allow-list of things that you can connect to you're going to need to set something up that verifies the validity of your allow-list against the firewall.

For example: Have a list (probably external to DNS Firewall) that has all of the site/DNS records that are allowed. Look each one up. If it is a CNAME, find the record that is returned and add that to the list and therefore to the firewall as well.

You could do this manually, but far better to automate it.

Note that this isn't going to be perfect. Even if you run it at one minute intervals you may have some clients blocked as changes occur. And it's entirely possible that the web pages that users are reaching are going to have other sites that they link to so there is a larger problem here. Restrictive allow-lists are always going to be a lot more work to maintain than is originally thought.

profile pictureAWS
EXPERTO
respondido hace 2 años

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas