how to prevent Route53 from exposing our VPC RFC1918 address space to the Internet

0

I need to know if it’s possible (and if possible, how) to prevent Route53 from exposing our VPC RFC1918 address space to the Internet. As you can see, these addresses are leaked out onto the Internet where they do no good except to expose the endpoints of various AWS services:

From inside Corp: ps@site:tmp$ dig test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com

; <<>> DiG 9.11.5-P1-1ubuntu2.5-Ubuntu <<>> test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1636 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 65494 ;; QUESTION SECTION: ;test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com. IN A

;; ANSWER SECTION: test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com. 4 IN A 172.31.58.126

;; Query time: 380 msec ;; SERVER: 127.0.0.53#53(127.0.0.53) ;; WHEN: Tue Sep 24 07:10:57 CDT 2019 ;; MSG SIZE rcvd: 106

From my home Linux system:

ps@plex:~$ dig test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com

; <<>> DiG 9.11.3-1ubuntu1.9-Ubuntu <<>> test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9577 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com. IN A

;; ANSWER SECTION: test-do-not-use.cmqvubhjfrhv.us-east-1.rds.amazonaws.com. 3600 IN A 172.31.58.126

;; Query time: 210 msec ;; SERVER: 127.0.0.1#53(127.0.0.1) ;; WHEN: Tue Sep 24 07:11:04 CDT 2019 ;; MSG SIZE rcvd: 106

Ideally this external query should return NOTHING.

I’ve been unsuccessful in my document digging in the AWS doc repository.

AWS
Dave_G
질문됨 5년 전377회 조회
1개 답변
0
수락된 답변

This comes up frequently, especially with public sector customers. To the best of my knowledge, this is something that cannot be disabled (normally due to requirements to resolve DNS for failover, service-to-service integration, etc). It also affects other services such as internal load-balancers, which can be queried externally and return the VPC IP addresses that have been assigned to them.

The way I typically handle this conversation is to explain to customers that although the internal IP addresses will be returned, since these are not routable from outside of the VPC, there is little that an attacker can do, just from the knowledge of them. Also, the DNS records include a random string, and do not reference the customer account ID, and so there is little risk of account discovery from brute-forcing DNS resolution across this space.

AWS
전문가
mhjwork
답변함 5년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠