Minimizing Information Leakage in the DNS

497 KB | 3 files |  PDF

Signature-based DNS security extensions have given hackers a way to scope out information on networks before they begin a direct attack. This paper looks at methods for mitigating this risk while still using DNSSEC to augment Internet security.

The Domain Name System is the global lookup service for network resources. To protect DNS information, the DNS security extensions have been developed and deployed on branches of the DNS to provide authentication and integrity protection using digital signatures. However, signed DNS nodes were found to have an unfortunate side effect: An attacker can query them as reconnaissance before attacking hosts on a particular network.

There are different ways a zone administrator can minimize information leakage and still take advantage of DNSSEC for integrity and source authentication. This article from the National Institute of Standards and Technology describes the risk and examines the protocol and operational options and looks at their advantages and drawbacks.

Included in this zip file are:

  • Minimizing Information Leakage in the DNS.pdf
  • Intro Doc.pdf
  • Terms and Conditions.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Security73 Guide to Application Whitelisting

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ...  More >>

Security29 Security of Interactive and Automated Access Management Using Secure Shell (SSH)

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ...  More >>

Security35.jpg Secrets: Managing Information Assets in the Age of Cyberespionage

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.