Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

cache snooping attacks

Hi All
My astaro DNS settings are the following

1)I am allowing internal network to use DNS
2)I am using openDNS to resolve and not the ISP ones
3)I have multiple static entries (in reverse) 
4)I am using dyndns

After using nessus to test my astaro box on the inside interface (IPS,port scan allowed), I got the following medium vunerability

The remote DNS server responds to queries for third-party domains
that do not have the recursion bit set. 

Explanation
=================
Synopsis

The remote DNS server is vulnerable to cache snooping attacks.

Description
The remote DNS server responds to queries for third-party domains
that do not have the recursion bit set. 

This may allow a remote attacker to determine which domains have
recently been resolved via this name server, and therefore which hosts
have been recently visited. 

For instance, if an attacker was interested in whether your company
utilizes the online services of a particular financial institution,
they would be able to use this attack to build a statistical model
regarding company usage of that financial institution.  Of course, the
attack can also be used to find B2B partners, web-surfing patterns,
external mail servers, and more.

Note: If this is an internal DNS server not accessable to outside
networks, attacks would be limited to the internal network. This
may include employees, consultants and potentially users on
a guest network or WiFi connection if supported.

Solution
Use another DNS software.

See Also
For a much more detailed discussion of the potential risks of allowing
DNS cache information to be queried anonymously, please see:
www.rootsecure.net/.../dns_cache_snooping.pdf

Risk Factor
Medium

CVSS Base Score
 5.0 (CVSS2#AV:N/AC:L/Au:N/C[:P]/I:N/A:N)

Plugin Publication Date: 2004/04/27


How can someone resolve this?


This thread was automatically locked due to age.
Parents
  • Sorry for opening an old thread. Was this issue ever addressed? 

  • What is your concern, Vi Tran?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi Bob,

     

    During our pen test, the recommendations to prevent cache snooping attacks were to "Block DNS queries to third-party domains that do not have the recursion bit set. Alternatively, contact
    the DNS software vendor to make fixes." 

     

    I was curious if this is something we can do on Sophos UTM.

  • Was the pen test executed from inside or outside your network?  Do you have a separate, internal DNS server or are you using the UTM as your DNS server for your internal devices?  Do you have an example of a third-party domain that triggered the fail in the pen test?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • Was the pen test executed from inside or outside your network?  Do you have a separate, internal DNS server or are you using the UTM as your DNS server for your internal devices?  Do you have an example of a third-party domain that triggered the fail in the pen test?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
No Data