Source: dmarcian
Author: Steven Iacoviello
URL: https://dmarcian.com/dangling-dns-cname-records/
ONE SENTENCE SUMMARY:
Dangling CNAMEs can delegate SPF to attackers, enabling DMARC-passing spoofing; maintain DNS hygiene, monitor sources, and alert on changes.
MAIN POINTS:
- CNAME records alias one domain to another canonical domain in DNS.
- Organizations delegate SPF or DKIM via CNAMEs to third-party vendors for easier management.
- SPF delegation through CNAME lets the target domain owner control authorized sending IPs.
- Dangling CNAMEs persist after services retire, pointing to nonexistent or abandoned resources.
- Domain ownership changes can let attackers weaponize dangling CNAME targets for malicious hosting.
- Abusers can publish their own SPF under the acquired CNAME target and send authorized mail.
- DMARC p=reject won’t stop aligned SPF mail if attackers control the delegated SPF path.
- Regularly review vendors and delete obsolete CNAMEs and other unnecessary DNS records.
- Examine MAIL FROM subdomains for SPF delivered via CNAME, removing unused delegations.
- DMARC reporting and alerting reveal anomalies like new sources, 100% SPF alignment, 0% DKIM.
TAKEAWAYS:
- Removing unused CNAMEs prevents domain-takeover abuse paths in DNS and email authentication.
- Delegated SPF via CNAME is powerful; treat the CNAME target as a critical trust boundary.
- DMARC visibility can expose dangling-CNAME exploitation patterns before major damage occurs.
- Automated monitoring for new subdomains and DNS changes speeds detection and response.
- Alerting integrations (email, Slack, Teams, webhooks) help operationalize continuous DNS hygiene.