Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Account for wildcard DNS resolution #6

Open
2 tasks
h-m-f-t opened this issue Aug 18, 2017 · 2 comments
Open
2 tasks

Account for wildcard DNS resolution #6

h-m-f-t opened this issue Aug 18, 2017 · 2 comments
Assignees

Comments

@h-m-f-t
Copy link
Member

h-m-f-t commented Aug 18, 2017

https://yourefired.usajobs.gov is not a host that OPM should be held accountable for, and resolves only because of a wildcard DNS record. trustymail presumes that "no NXDOMAIN response" means there's an individual host there, but this is too simplistic.

TODOs:

@jsf9k jsf9k self-assigned this Dec 8, 2017
@jsf9k
Copy link
Member

jsf9k commented Dec 8, 2017

What do we want to do here? Just add another field in the output for each non-second-level domain indicating whether it's a wildcard match?

@konklone
Copy link
Contributor

konklone commented Dec 9, 2017

https://yourefired.usajobs.gov is not a host that OPM should be held accountable for

So, it depends. What circumstances in trustymail make it reasonable to treat this differently from a deliberately set record? For DMARC, you're requiring that base domains apply policy to all subdomains. For other record types, you're requiring that email-sending hostnames do some work and have STARTTLS enabled, and presumably yourefired.usajobs.gov is not being used to send email.

Also, when wildcard DNS is being used for legitimate purposes (such as *.app.cloud.gov being used for all cloud.gov sandbox apps), you don't want to necessarily drop all of those records from what you're scanning. And scanning app.cloud.gov won't necessarily give you the same results as [anything].app.cloud.gov.

See how domain-scan tackled this problem

Just a note that we've never used that in our actual scans. That code was written for a one-time analysis of DNS log data from the .gov TLD, to try to get a better signal-to-noise ratio.

I could see it potentially being broadly useful to have this information available during some kinds of scans. But it's tricky to avoid dropping legitimate services when wildcard DNS is in use.

mcdonnnj pushed a commit that referenced this issue Jan 23, 2023
mcdonnnj pushed a commit that referenced this issue Jan 23, 2023
…ges_from_skeleton_generic

Merge in upstream changes from skeleton-generic
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants