Check-Host.cc

Global AXFR (Zone Transfer) Security Checker

An AXFR (Asynchronous Full Transfer Zone) request is the foundational mechanism used by DNS servers to replicate entire routing databases across a network cluster. Unlike standard A or MX lookups, which utilize lightweight, stateless UDP packets to fetch a single data point, an AXFR transfer is strictly a server-to-server protocol. Because downloading an entire domain's infrastructure involves transmitting potentially thousands of records, RFC 5936 mandates that AXFR requests establish a stateful, reliable TCP connection on port 53 to guarantee complete packet delivery and data integrity.

SOA Triggers and IXFR Optimization

The replication process is actively governed by the domain's SOA (Start of Authority) record. Secondary nameservers routinely poll the primary master server. If the secondary server detects that the SOA Serial Number has incremented, it initiates a transfer to synchronize the data. While AXFR downloads the absolute entirety of the zone file, modern architectures often default to IXFR (Incremental Zone Transfer). IXFR calculates the delta—the exact differences between the old serial number and the new one—and only transmits the modified records, significantly reducing bandwidth overhead and processing load on massive enterprise zones.

Zone Walking and Cybersecurity Threats

From an information security perspective, an improperly secured AXFR endpoint is a catastrophic reconnaissance vulnerability. If a primary nameserver is misconfigured to accept AXFR requests from any arbitrary public IP address, it allows unauthorized actors to execute a "Zone Walk." By issuing a single command (e.g., dig AXFR @ns.example.com example.com), an attacker can download the organization's entire internal routing map. This instantly exposes unlinked staging environments, forgotten internal VPN gateways, deprecated SaaS endpoints vulnerable to takeover, and proprietary server naming conventions.

Securing the Perimeter with TSIG and ACLs

Testing your perimeter against an open AXFR vulnerability is a fundamental requirement of any penetration test. A properly hardened nameserver must aggressively restrict transfer queries utilizing strict IP-based Access Control Lists (ACLs), ensuring only authorized secondary server IPs can initiate the download. For modern enterprise security, administrators deploy TSIG (Transaction Signature). TSIG utilizes a shared, cryptographically hashed secret key between the primary and secondary servers. If the incoming AXFR request does not possess the correct mathematical signature, the primary server instantly drops the TCP connection and returns a fatal REFUSED error, shielding the network topology from public exposure.