Hello, In a "DNS Rebind Attack", the attacker controls a domain name (say attacker.com) and the corresponding DNS server with very short time-to-live (TTL). Consider a scenario where the victim accidentally browses and downloads content from a malicious domain name. The "stop-dns-rebind" flag prevents malicious javascript(from the malicious domain) to probe local network devices because dnsmasq refuses to bind the domain name to a local IP address.
curl -v http://10.10.10.1/ --> this should return '200 OK' curl -v http://domainname --> this should return '400 Bad request', where domain name falls under private IP address range In both the cases, the output was 200 OK. The above is tested by enabling stop-dns-rebind flag in dnsmasq.conf and also with options(like dnsmasq -u nobody -q --clear-on-reload --bind-dynamic --stop-dns-rebind). Could someone please let me know anything else to be done to avoid DNS rebind attacks. Thanks and regards Indhuja _______________________________________________ Dnsmasq-discuss mailing list Dnsmasq-discuss@lists.thekelleys.org.uk https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss