B
boomboom999
We have Active Directory with 5000 users, and every Domain Controller
is a DNS server as well. To allow resolving external DNS adresses there
are two options:
1. Open outbound TCP/UDP 53 connections from the domain controllers
toward the Internet.
2. Use an intermediate forwarder DNS servers
1. Pros and Cons for a direct connection
+ Simplier solution
+ No additional hardware/software required
+ No risk of hijacking external DNS resolution by a hacker
- If I open outbound UDP, I should also allow inbound UDP responses. As
UDP is connectionless, there is no way for the firewall to make sure
that inbound packets are related to the previous outbound packets. So,
it is possible to send some corrupted UDP packets to the internal
Domain Controllers and cause a DoS or take control of the Active
Directory
- There were vulnerabilities in BIND like this one
http://www.kb.cert.org/vuls/id/844360
An incorrect DNS response can causer a buffer overflow on the internal
server -> remote code execution -> phoning home -> taking control over
the Active Directory
2. Pros and Cons for a connection via forwarder
Same points in reverse order.
An additionnal Con point for the forwarder - if someone take control
over the DNS forwarder (ISP's one or our own forwarder) it is possible
to hijack and manipulate all the external DNS requests, redirect
trafic, sniff it etc. So, if I go with forwarder, it would be necessary
to put it into a separate DMZ that is not exposed to inbound
connections.
What would you recommend?
is a DNS server as well. To allow resolving external DNS adresses there
are two options:
1. Open outbound TCP/UDP 53 connections from the domain controllers
toward the Internet.
2. Use an intermediate forwarder DNS servers
1. Pros and Cons for a direct connection
+ Simplier solution
+ No additional hardware/software required
+ No risk of hijacking external DNS resolution by a hacker
- If I open outbound UDP, I should also allow inbound UDP responses. As
UDP is connectionless, there is no way for the firewall to make sure
that inbound packets are related to the previous outbound packets. So,
it is possible to send some corrupted UDP packets to the internal
Domain Controllers and cause a DoS or take control of the Active
Directory
- There were vulnerabilities in BIND like this one
http://www.kb.cert.org/vuls/id/844360
An incorrect DNS response can causer a buffer overflow on the internal
server -> remote code execution -> phoning home -> taking control over
the Active Directory
2. Pros and Cons for a connection via forwarder
Same points in reverse order.
An additionnal Con point for the forwarder - if someone take control
over the DNS forwarder (ISP's one or our own forwarder) it is possible
to hijack and manipulate all the external DNS requests, redirect
trafic, sniff it etc. So, if I go with forwarder, it would be necessary
to put it into a separate DMZ that is not exposed to inbound
connections.
What would you recommend?