News

NIST Updates DNS Security Guidelines

The National Institute of Standards and Technology (NIST) is updating its recommendations for meeting the unusual security challenges presented by the domain name system (DNS), which underpins much of the Internet by mapping user-friendly domain names to numerical IP addresses.

"The domain name data provided by DNS is intended to be publicly available to any computer located anywhere in the Internet," NIST states in Special Publication 800-81, "Secure Domain Name System Deployment Guide." "Because DNS data is meant to be public, preserving the confidentiality of DNS data pertaining to publicly accessible IT resources is not a concern. The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name information in transit."

Achieving those goals requires good network security practices that encompass up-to-date software patches, process isolation and fault tolerance, and the use of the more specific DNS Security Extensions (DNSSEC) to digitally sign and authenticate DNS query and response transactions.

NIST outlined the following basic steps for deploying DNSSEC for zone information:

  • Install a DNSSEC-capable name server.
  • Check zone file(s) for possible integrity errors.
  • Generate asymmetric key pairs for each zone and include them in the zone file.
  • Sign the zone.
  • Load the signed zone onto the server.
  • Configure the name server to turn on DNSSEC processing.
  • Send a copy of the public key to the parent for secure delegation (optional).

In addition to minor textual corrections, the guidance includes the following revisions:

  • Updated recommendations for cryptographic parameters based on NIST Special Publication 800-57.
  • A discussion of NSEC3 Resource Record in DNSSEC.
  • A discussion of DNSSEC in split-view deployments.
  • Minor fixes of examples and text.
  • Examples based on the name server daemon and Berkeley Internet Name Domain software.

NIST will hold two public commenting periods. The first one ends March 31; those interested in participating can send comments on the updated guidelines to [email protected].

In addition to integrity and authentication, ensuring the availability of DNS services and data is also important. DNS components are subject to denial-of-service attacks that seek to block access to the domain names. The NIST document provides guidelines for configuring deployments to prevent many of the denial-of-service attacks targeted at DNS.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

Featured

  • Microsoft Adds Privileged Identity Management Delegation to Azure Lighthouse

    The commercial release of Privileged Identity Management (PIM)-enabled Azure Lighthouse delegations is now available, Microsoft on Monday announced.

  • Microsoft Commercially Releases Entra Workload Identities

    Microsoft announced on Monday that its Entra Workload Identities service is now available as a commercial product offering, having reached the "general availability" stage.

  • The 2022 Microsoft Product Roadmap

    Microsoft has a lot in the docket for 2022, including new products like SQL Server 2022, Exchange Subscription Edition and Visual Studio 2022 for Mac.

  • OpenSSF Adopts Microsoft Open Source Software Security Guidelines

    The Open Source Security Foundation (OpenSSF) announced on Wednesday that it has adopted the Secure Supply Chain Consumption Framework (S2C2F) for ensuring the secure use of open source software (OSS) by developers.