cisagov / manage.get.gov

A Django-based domain name registrar used by the .gov domain to communicate with an EPP registry
https://get.gov
Other
59 stars 18 forks source link

Security: Detect, correct, and prevent lame delegations #1037

Open PaulKuykendall opened 1 year ago

PaulKuykendall commented 1 year ago

Issue Description

Research and develop a strategy to prevent "lame delegation," and other domain hijacking techniques.

"...a lame delegation occurs when a nameserver responsible for a domain is unable to provide authoritative information to translate human readable domain names to IP addresses." (source)

This is a potential performance and security risk. Lame queries, those for which the nameserver is not authoritative, result in recursing resolvers until an authoritative nameserver is found. This impacts performance. More seriously, lame delegations may make a domain vulnerable to hijacking, for example when a domain is deleted or expired.

AC:

Additional Context (optional)

Additional reading for research:

Issue Links

Related to #1036

vickyszuchin commented 6 months ago

Accepted into the backlog.

Katherine-Osos commented 2 months ago

@PaulKuykendall @katypies Is this dev discovery? If so, can we add the "Dev" label to help differentiate it?

PaulKuykendall commented 2 months ago

I have added this to the DNS hosting milestone, so that we keep track of it there. We can break it into a different milestone within that feature, sometime in the future, if we feel it's necessary. I've added the Dev and refinement labels and will notify @abroddrick for visibility.

katypies commented 2 months ago

Noting that I added a feature label for DNS-related issues. This is something that's broader than the scope of us hosting DNS, so I think we should tackle it as part of a milestone separate from DNS hosting (quite possibly we need to do a collection of security and NS-related issues for domains that don't end up pointing to our NS).