[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <985b1a3d0710230059h59724851v8712987cb2b1c532@mail.gmail.com>
Date: Tue, 23 Oct 2007 09:59:48 +0200
From: "Guasconi Vincent" <tyoptyop@...il.com>
To: "Collin R. Mulliner" <collin@...aversion.net>,
full-disclosure@...ts.grok.org.uk
Subject: Re: simple dns rebinding protection with dnsmasq
On 10/22/07, Collin R. Mulliner <collin@...aversion.net> wrote:
> dnsmasq (http://www.thekelleys.org.uk/dnsmasq/doc.html) a popular DHCP
> and DNS forwarder and cache server used on many DSL/Cable routers now
> has a simple DNS Rebinding protection mechanism. When executed with the
> --stop-dns-rebind option the DNS resolver in dnsmasq will filter out
> private IP addresses (127.0.0.0/8, 192.168.0.0/16, 10.0.0.0/8,
> 172.16.0.0/12 and 169.254.0.0/16). This should be sufficient for most
> private/home users.
>
> Feedback welcome.
>
>
> dnsmasq:
> http://www.thekelleys.org.uk/dnsmasq/doc.html
>
>
> dnsmasq with dns rebinding protection:
> http://www.thekelleys.org.uk/dnsmasq/test-releases/dnsmasq-2.41test11.tar.gz
>
> orginal patch:
> http://www.mulliner.org/blog/blosxom.cgi/security/dnsmasq_dnsrebinding_protection_patch.html
>
DNS Spoofing problems... aren't in DNS.
Nevermind thanks for the fix, it's a good idea, and going to help anyway.
I hope Adobe (and some others) hear you. (^-^)
--
Guasconi Vincent
Etudiant.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists