S 5.59 Protection against DNS spoofing in authentication mechanisms

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

A threat from DNS spoofing during authentication can arise where authentication is effected using a computer name. This should be made more difficult by one (or a combination) of the following configuration settings:

1. IP addresses should be used, not host names.

2. If host names are used, they should all be resolved locally (entries in the file /etc/hosts).

3. If host names are used but they cannot be resolved locally, all names should be resolved directly by a DNS server which acts as primary or secondary DNS server, i.e. stores the names permanently instead of in a temporary cache.

Option 1 provides the highest security, option 3 the least. The aim of the above configuration settings is to protect the assignment between IP addresses and computer names against manipulation. If name resolution cannot be performed directly, so that a cache is interposed, then under no circumstances should host-based access be allowed via a host name.

Review questions: