S 2.451 Planning the use of DNS

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: IT Security Officer

A basic requirement for the secure use of DNS servers is appropriate advance planning. For this, a concept must be drawn up at first that should contain information on how the DNS is to be designed and which domain information is worthy of protection, amongst other information. Not only the aspects classically associated with the term "security" need to be planned, but also normal operating aspects that may lead to requirements in the area of security. Safeguard S 2.450 Introduction to DNS basics provides information on the design and the basic structure of DNS.

Selecting the hardware

The hardware a DNS server is to be operated on has decisive influence on the overall performance of the system to be built. In this regard, it must be considered how many requests a DNS server receives on average, whether or not it is a resolving DNS server accepting recursive requests, or whether or not it is an advertising DNS server only accepting iterative requests, and whether or not the use of DNSSEC (DNS Security Extensions) is planned.

For DNS servers, an adequate extension of the main memory is important so that the server does not have to outsource storage content to the hard disk, which would result in increased response times. If DNSSEC is used, it must absolutely be ensured that the processor speed is increased accordingly in order to maintain appropriate throughput during cryptographic operations. The capacities for main memory and processor speed selected during the planning phase must be checked during operations, since the capacities actually required can only be determined accurately during live operations.

Visibility of the domain information

A DNS server administrates the information for its authoritative zones. Some of these zones are intended for the public, e.g. the IP address of a web server or email server. However, part of the domain information refers to the internal structure of the organisation's network. This information may often provide details on the function or the location of the corresponding network components. Therefore, the visibility of this domain information should be restricted with the help of a differentiation between advertising and resolving DNS servers, as described in the "separate DNS servers" section below.

The name space of an information system should be divided into a public and an organisation-internal area. The public part should only contain such domain information (normally the IP address or the host name) required for the smooth functioning of services that are to be available from the outside. Normally, these include:

Within the organisation, the visibility of the information does not have to be restricted in the majority of cases. The domain information visible to the outside and the information not visible to the outside must be taken into consideration when planning the use of DNS.

Separate DNS servers

DNS servers are differentiated according to their tasks, wherein there are two basic types as a matter of principle:

The task of advertising DNS servers is usually to process requests from the internet. Resolving DNS servers, however, process requests from the internal network. Since these two tasks differ, they must be separated. Therefore, it is recommendable to use separate physical servers for advertising and resolving DNS servers in each case. The advertising DNS server administrates the domain information available from external sources and only supports iterative requests; the resolving DNS server administrates the internally visible information and supports both iterative and recursive requests.

If the time and expense required for separating the advertising from the resolving DNS server is too high or if this is not possible due to technical reasons, more simple configurations may be used, if required. A BIND DNS server offers the option of defining different views to the domain information. In this case, a DNS server may administrate a view for requests from the internal network of an organisation providing all domain information of an information system. This is the resolving DNS server. The second view for requests originating from the internet only contains a part of the domain information classified as being public during classification. This is the advertising DNS server. This design offers a lower level of security when compared to two separate DNS servers and whether the higher risk is acceptable must be considered on a case-by-case basis.

Location of the DNS servers in the network

The location of the DNS servers depends on the network infrastructure of the respective organisation. However, some basic rules must be adhered to:

An exemplary distribution of the DNS servers in combination with security gateways and packet filters is described in S 5.118 Integration of a DNS server into a security gateway.

Resolver

Resolvers are integrated into the commonly used operating system as standard and therefore do not have to not be selected and procured separately. However, it should be ensured that the resolvers of the internal IT systems use the internal resolving DNS servers for name resolution. They should in no case query external DNS servers by default. Additionally, the DNS suffixes used by the resolvers should also be defined, e.g. ""bsi.bund.de". As a result, the rest of the domain name is automatically completed to become the Fully Qualified Domain Name (FQDN) "hostx.bsi.bund.de." when resolving the name of "hostx".

Administration of domain names

During the planning phase, the responsibilities for administrating the internet domain names should be defined. The person responsible must ensure that the safeguards are adhered to, as described in S 2.298 Administration of Internet domain names.

Review questions: