odahu / odahu-automation

Apache License 2.0
8 stars 0 forks source link

DNS data exfiltration secure #78

Open karbyshevds opened 3 years ago

karbyshevds commented 3 years ago

As an operations engineer I want to be able to secure my deployment from DNS exfiltration. To achieve this from infrastructure side I want to be able to:

  1. Provide list of public DNS records that should resolve from ODAHU installation (whitelist)
  2. Create private DNS zone that will resolve all requests from ODAHU VPC. This zone should.
    • Resolve all requests to whitelisted DNS records to valid IP adresses
    • Resolve requests to all other records into 127.0.0.1
  3. Provide a URL or list of URLs that should be used as dependency proxy, e.x.:
    • Python
    • Conda
    • ?
  4. Above parameters should be optional:
    • Empty whitelist means that there should be no private zone
    • Empty dependency proxy URLs means that no proxy should be used
  5. Add dependency proxy deployment to automation scenarios (e.x.: Nexus). Deployment can be separate VM that should be setup in separate network with default DNS settings via installation process. It's URL should be provided as dependency URL to all related services via configuration parameters and then used to resolve dependencies from network with secured DNS.

Examples about the issue: https://resources.infosecinstitute.com/topic/bypassing-security-products-via-dns-data-exfiltration/