Route 53 DNS Firewall - Wildcard / CNAME issue

1

We're using DNS firewall and using an allowed list acceptable outbound domains. In some cases where there are multiple subdomains like sec.gov so we use a wildcard *.sec.gov. www.sec.gov is a CNAME record which returns www.sec.gov.edgekey.net. and the subsequent lookup of that fails unless we add that to our allowed list as well. Makes sense. There have a few domains where the target of the CNAME has changed and we can only update after the DNS lookup has failed and we are alerted. I'm just wondering if there is any way to be proactive with this, by somehow allowing the *.sec.gov to cover any CNAME it may encounter.

질문됨 2년 전923회 조회
1개 답변
1

Given that you have no control over the target DNS and you want to have a very strict allow-list of things that you can connect to you're going to need to set something up that verifies the validity of your allow-list against the firewall.

For example: Have a list (probably external to DNS Firewall) that has all of the site/DNS records that are allowed. Look each one up. If it is a CNAME, find the record that is returned and add that to the list and therefore to the firewall as well.

You could do this manually, but far better to automate it.

Note that this isn't going to be perfect. Even if you run it at one minute intervals you may have some clients blocked as changes occur. And it's entirely possible that the web pages that users are reaching are going to have other sites that they link to so there is a larger problem here. Restrictive allow-lists are always going to be a lot more work to maintain than is originally thought.

profile pictureAWS
전문가
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인