Score:0

Does mapping internal servers to subdomains leave them more exposed than just using IP?

de flag

We've got a service online that's composed of some Amazon EC2 instances. We were going to map the internal server instances to subdomains for practicality but a colleague said this could end up making our servers more exposed to attackers(e.g.: they'd be able to scan and target us more easily), I've tried researching on this but couldn't really find anything, I could be using the wrong keywords though. Is it true and why?

Michael Hampton avatar
cz flag
You should ask him what exactly is being exposed?
Score:2
cn flag

It allows attackers or anyone to see more easily you are using Amazon EC2, but that can't be hidden either even if just having the IP address.

The problem often around doing:

internal-service.example.com. CNAME some-provider-managed-instance.example.

is what happens "later" and if you stop needing this service but you continue having this CNAME record that should have been removed but often isn't.

This is called Dangling DNS records (or "DARE" for some reason), and you can find all details at https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=1829&context=aspubs for example.

It boils down though to just good stewardship of your zone, and removing any DNS records you don't need anymore, as soon as you don't need them anymore. Because whatever provider you use may not verify properly the ownership and hence, once you stop using the resource yourself, some other customer may find a way to claim that resource at the provider and then it gains "control" of part of your zone because YOU have a record in the zone pointing to something that is now controlled by someone else than you.

Same, in other cases, where you have your CNAME still existing while not needed but pointing to a name under a domain name that doesn't exist anymore: anyone would be able to register that name and then gain control of part of your namespace because of your record.

The problem is exactly the same if you don't have a CNAME but directly an A/AAAA record pointing to some externally controlled IP address. So by itself just using a CNAME does not expose to more risks, except the standard ones with CNAME (loops, too long chains, impossible to use at apex, etc.)

PS: if your colleague claims something, you might want to ask him more about it and some argumentation at least to be able to search on your side and make your own conclusions. It is difficult exactly (with so little details in your question) what exact threat vectors he was thinking about and hence why he thinks so.

de flag
Thanks Patrick! Indeed you're right on the tip, we're just usually juggling multiple tasks so I wanted to get better informed on this before bringing it up for discussion again and hopefully make the decision most efficiently, also seemed like a question that deserved some sourcing for Google/Posteriority! I'll try to fill here with what vectors he meant.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.