Route 53 DNS Firewall - Wildcard / CNAME issue

1

We're using DNS firewall and using an allowed list acceptable outbound domains. In some cases where there are multiple subdomains like sec.gov so we use a wildcard *.sec.gov. www.sec.gov is a CNAME record which returns www.sec.gov.edgekey.net. and the subsequent lookup of that fails unless we add that to our allowed list as well. Makes sense. There have a few domains where the target of the CNAME has changed and we can only update after the DNS lookup has failed and we are alerted. I'm just wondering if there is any way to be proactive with this, by somehow allowing the *.sec.gov to cover any CNAME it may encounter.

質問済み 2年前923ビュー
1回答
1

Given that you have no control over the target DNS and you want to have a very strict allow-list of things that you can connect to you're going to need to set something up that verifies the validity of your allow-list against the firewall.

For example: Have a list (probably external to DNS Firewall) that has all of the site/DNS records that are allowed. Look each one up. If it is a CNAME, find the record that is returned and add that to the list and therefore to the firewall as well.

You could do this manually, but far better to automate it.

Note that this isn't going to be perfect. Even if you run it at one minute intervals you may have some clients blocked as changes occur. And it's entirely possible that the web pages that users are reaching are going to have other sites that they link to so there is a larger problem here. Restrictive allow-lists are always going to be a lot more work to maintain than is originally thought.

profile pictureAWS
エキスパート
回答済み 2年前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ