Route 53 DNS Firewall - Wildcard / CNAME issue

1

We're using DNS firewall and using an allowed list acceptable outbound domains. In some cases where there are multiple subdomains like sec.gov so we use a wildcard *.sec.gov. www.sec.gov is a CNAME record which returns www.sec.gov.edgekey.net. and the subsequent lookup of that fails unless we add that to our allowed list as well. Makes sense. There have a few domains where the target of the CNAME has changed and we can only update after the DNS lookup has failed and we are alerted. I'm just wondering if there is any way to be proactive with this, by somehow allowing the *.sec.gov to cover any CNAME it may encounter.

已提问 2 年前925 查看次数
1 回答
1

Given that you have no control over the target DNS and you want to have a very strict allow-list of things that you can connect to you're going to need to set something up that verifies the validity of your allow-list against the firewall.

For example: Have a list (probably external to DNS Firewall) that has all of the site/DNS records that are allowed. Look each one up. If it is a CNAME, find the record that is returned and add that to the list and therefore to the firewall as well.

You could do this manually, but far better to automate it.

Note that this isn't going to be perfect. Even if you run it at one minute intervals you may have some clients blocked as changes occur. And it's entirely possible that the web pages that users are reaching are going to have other sites that they link to so there is a larger problem here. Restrictive allow-lists are always going to be a lot more work to maintain than is originally thought.

profile pictureAWS
专家
已回答 2 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则