T 2.152 Lack of, or inadequate, planning of the use of DNS

If planning the use of DNS is neglected, such neglect can result in problems and security gaps during live operation. Numerous network services and applications require DNS in order to function properly. Thus, DNS is needed by communication partners in order to find out the IP address of a recipient's e-mail server. If the DNS servers are not accessible, these services cannot be used or can only be used to a limited extent. In the worst case, a security gap caused by poor planning can result in the DNS servers becoming compromised.

DNS server infrastructure

The availability and performance capability of DNS servers depends, amongst other things, on the distribution in the network. Problems which might arise from planning the infrastructure inadequately include:

Unsuitable DNS server software

Outdated and/or less tested software often contains known software vulnerabilities that may be exploited by malicious software (malware). Thus, the risk of successful attacks increases significantly.

In addition, problems can occur if the same software is used for all DNS servers. If, in this case, a DNS server is compromised due to a software vulnerability, this gap can be exploited on any other DNS server. If an information system, however, intends to use different DNS server software components, there is a risk of them only being compatible to a limited extent. In addition, this leads to an increase in the time and effort required for administration.

DNS servers and security gateways

The planning of the DNS servers has an effect on the configuration of security gateways and packet filters. If the rules allowing DNS traffic in the network are defined too generously, this might make an attack possible under certain circumstances. However, if the rules have been formulated too restrictively, legitimate clients might not be able to send requests to the DNS servers and are impaired when using services such as e-mail, FTP or the like.

Division of the name space

The domain information on the name space of an information system contains all information on the structure of the internal network. Often, making all the information accessible to the general public is not desired. For this purpose, the name space can be divided into an internal (resolving DNS server) and a publicly accessible (advertising DNS server) area. If such division is not taken into account when planning the use of DNS, problems as described in T 5.154 DNS information leakage might arise.

Cryptography

DNS can be protected using cryptographic mechanisms, for example using TSIG (Trusted Security Transaction Group) and DNSSEC (DNS Security). Like for any cryptographic applications, the cryptographic keys are secret material. If these keys are published, these cryptographic mechanisms no longer ensure any protection. If the planning does not include clear rules as to what extent cryptography is to be used, such lack of clarity can, amongst other things, cause the following problems:

Examples: