M Dns Prevention of Dns Attacks
M Dns Prevention of Dns Attacks
M Dns Prevention of Dns Attacks
A DNS attack is any attack targeting the availability or stability of a network’s DNS service. There are many
different ways in which the DNS can be attacked, such as DNS cache poisoning, DDoS, DNS spoofing, and
so on. This chapter explains the features available in Cisco Prime Network Registrar which help in preventing
the DNS security related threats and attacks.
• Prevention of DNS Attacks in Cisco Prime Network Registrar, on page 1
Cache Poisoning
• DNS cache poisoning prevention
A cache poisoning attack can change an existing entry in the DNS cache as well as insert a new invalid
record into the DNS cache. This attack causes a hostname to point to the wrong IP address. For more
information on handling cache poisoning attacks, see Detecting and Preventing DNS Cache Poisoning.
• Dynamic allocation of UDP ports
The Caching DNS server uses a large number of UDP port numbers. The large number of port numbers
reduce the risk of cache poisoning via Birthday Attacks. For more information, see Dynamic Allocation
of UDP Ports.
• Randomization of DNS transaction ID
The DNS transaction ID and source port number used to validate DNS responses are not sufficiently
randomized and can easily be predicted, which allows an attacker to create forged responses to DNS
queries. The DNS server will consider such responses as valid. In Cisco Prime Network Registrar DNS
server, the transaction ID and port number are randomized.
• Randomized query names
Domain randomization allows a DNS server to send upstream queries for resolution with a randomly
generated query name. A valid name server responds with the query name unchanged and therefore this
technique can be used to ensure that the response was valid.
Cisco Prime Network Registrar supports randomizing upstream queries, but there are some name servers
that do not maintain the randomized case. Therefore, if you enable case randomization, you may block
out valid name servers. The randomize-query-case-exclusion attribute allows you to create an exclusion
list, so that you can continue to use case randomization, but exclude name servers that do not maintain
the case but still respond with a valid answer. For more information, see Specifying Resolver Settings.
DDoS Attacks
• Rate limiting
Rate limiting helps the DNS server from being overwhelmed by a small number of clients. It also protects
against upstream query attacks against Authoritative DNS servers. This feature helps to mitigate some
of the DDoS attacks and prevents the server from being overwhelmed by a small number of clients. It
allows you to limit the malevolent traffic. For more information, see Managing Caching Rate Limiting.
• Smart cache
Whenever Authoritative DNS servers face an outage or are offline for other reasons, this could cause
issues with being able to reach Internet services that are likely not impacted. Smart caching allows the
Caching DNS server to continue to serve the expired data (last known answer) when it cannot reach the
authoritative name servers. The Caching DNS server will still continue to contact the authoritative name
servers and when the name servers are once again functional, the Caching DNS server will update its
expired data. Smart Caching is useful to mitigate network outages and possible DDoS attacks that make
the authoritative name servers unavailable. For more information, see Enabling Smart Caching.
• DNS amplification attack prevention
A DNS amplification attack is a popular form of DDoS attack that relies on the use of publically accessible
open DNS servers to flood a target system with DNS response traffic. The primary technique consists
of an attacker sending a DNS name lookup request to an open DNS server with the source address spoofed
to be the target’s address. When the DNS server sends the DNS record response, it is sent instead to the
target. Attackers typically submit a request for as much zone information as possible to maximize the
amplification effect. In most attacks of this type, the spoofed queries sent by the attacker are of the type,
“ANY,” which returns all known information about a DNS zone in a single request. Because the size of
the response is considerably larger than the request, the attacker is able to increase the amount of traffic
directed at the target. In Cisco Prime Network Registrar, the allow-any-query-acl attribute on the Manage
Servers page helps in minimizing the size of the response.
creates a DNS firewall to prevent misuse of the DNS server. For more information, see Managing DNS
Firewall.
• Secure DNS server activity with ACLs
You can restrict clients to query only certain zones based on an ACL.
• Restricting Zone Queries—The restrict-query-acl attribute on the DNS server serves as a default
value for zones that do not have restrict-query-acl explicitly set.
• Restricting Zone Transfer Requests—The restrict-xfer-acl attribute filters the zone transfer request
to the known secondary servers.
• Restricting DDNS Updates—The update-acl attribute filters DDNS packet from the known DHCP
servers.