Spamhaus Technology and abuse.ch Logo
Solutions
Data
Email & Network
Cyber Threat Intelligence
Resources
About
Back to Previous Page

Blog

What is a DNS Firewall? A beginner’s guide

Posted on
September 14, 2018
Author
Milly Fawcett
Read time
5 mins

Introduction

Introduction

At its most basic level, similar to traditional firewalls, a DNS Firewall blocks/redirects end-users from accessing malicious sites. The main difference between the two is that a DNS Firewall is applied at a different layer and phase, namely threat intelligence datasets. This circumvents the loss of visibility that is making traditional firewalls less effective due to the significant increases in end to end encrypted traffic.

But why should you use a DNS Firewall?

In addition to protecting your users against identity theft, installation of malware and data exfiltration, there are other reasons to use this type of firewall as part of your multi-layered security, including:

Educating your end users: Following an attempt to connect to a bad domain you can enlighten your end-user as to the danger they have just avoided e.g. potentially connecting to a phishing site. This can either be done via a landing page which they are redirected to, or by reaching out to them directly; turning a bad decision into a positive teaching opportunity.

Freeing up your busy team: Utilizing this kind of firewall automatically mitigates some of the serious issues that may arise on your network as a result of it being compromised. This provides your teams with additional time to focus on resolving other pressing network and security issues.

Gaining insight to be proactive: It provides you with more visibility into compromised users or clients on your network. This enables you to take immediate action without the time lag of either being notified by a third party, or discovering the issue at a later date, be that days, weeks or months after the attack.

It’s easy to apply & simple to maintain: Once this firewall has been applied to the DNS all the clients on your network, including IoT devices, are protected from accessing malicious sites. This minimizes deployment resources. Meanwhile the datasets, against which potential connections are checked, are continuously update. This removes the need for upgrades and updates.

Brand protection: For ‘trusted’ brands online security breaches can have a huge impact on business. One only has to look to British Airways in the UK and their significant data breach to understand the consequences. It is vital to have multiple layers of security to keep company networks and users “Ëœsafe’.

Lower cyber risk insurance costs: Insurance (and its associated costs) probably don’t fall under your department’s responsibilities or budget. However, it’s highly likely that someone in your organization will be pleased to discover that implementing DNS Firewall can reduce your cyber risk insurance costs.

How can DNS Firewall be implemented?

There are three ways to implement DNS Firewall. It is worth noting that all three use ‘threat intelligence datasets’ to identify bad domains, however there are differing ways in how you can access/utilize these datasets:

  • On-premises open source software: Threat intelligence datasets are transferred via AXFR/IXFR to your DNS resolver as ‘zone’ files. Originally, DNS Firewall was designed to be an open and translatable standard, with it’s initial home being BIND. Now other DNS servers such as PowerDNS, Knot, and Unbound also provide support for using DNS Firewall datasets.
  • On-premises appliance: An internal solution/application, located within your network, working as a management system for your DNS’s security infrastructure which utilizes threat intelligence datasets. Depending on the supplier you may, or may not, have the flexibility to choose your preferred dataset supplier.
  • Cloud: Service providers with their own DNS resolvers which are protected by DNS Firewall with threat intelligence datasets, and are accessed, like a managed service, by customers.

How DNS Firewall works

Let’s take a deeper dive into how DNS Firewall works:

Standard DNS Resolvers: When an end-user attempts to go to a website/domain, the resolver will query a root server, then a top-level domain server, and finally the server of the site, which will complete the resolution of the request by the end-user. The client’s request to access the site will take place regardless of whether the site is malicious or not.

DNS Resolver with DNS Firewall: During the resolution process “zones”, which consist of sets of threat intelligence data, are queried. The requested domain is analyzed for potential security risks against the data sets, and if a match is returned the request is blocked or redirected.

Take a look at the examples below to see what end-users may potentially see if they tried to connect to a phishing site in each of the following situations:

Where the DNS Firewall is enabled the end-user who has attempted to access the phishing site has been prevented from doing so, and consequently protected from the potential harm that could lead to. Moreover, because the mitigation has occurred at the DNS level there has been no need for the end-user to install an additional program or update software on their workstation.

Introducing Spamhaus DNS Firewall

With Spamhaus DNS Firewall, you gain access to a wide range of DNS RPZ files that can block or redirect sites based on your organizations risk profile. These include botnet C2 IPs, highly malicious networks, low reputation domains, and zero reputation domains.

You select the zones, and Spamhaus provides the data - configurable to your DNS protection needs. This allows you to automatically block malicious activity threats such as phishing sites, malware dropper sites and ransomware, protecting your network and users.

What next?

DNS Firewall has the potential to free up teams to accomplish other tasks and build a secure proactive, not reactive, network experience for everyone within your organization.

Now you know how DNS Firewall works it’s time to look at what considerations you need to be making when implementing it.

Sign up for a 30 day FREE trial of Spamhaus DNS Firewall zones here.