On Sat, Nov 12, 2022 at 10:30:09AM +0800, ZhangJiangyu 张江瑜 via Dnsmasq-discuss wrote: > Hi, > > Description > > When the DNS forwarder iteratively queries the malicious domain name > server, it returns some malformed dns packets, and dnsmasq returns the > packet to the client without proper verification, which will give the > user a distrust or malicious data. Other authoritative dns servers > have done correct verification. there are three bugs below, you can > start a fake domain name server locally and return specific data. > > Steps to reproduce > > 1、Turn on a fake name server and return a specific payload.
How? Groeten Geert Stappers -- Silence is hard to parse _______________________________________________ Dnsmasq-discuss mailing list Dnsmasq-discuss@lists.thekelleys.org.uk https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss