On 10/22/07, Collin R. Mulliner <[EMAIL PROTECTED]> wrote:
> dnsmasq (http://www.thekelleys.org.uk/dnsmasq/doc.html) a popular DHCP
> and DNS forwarder and cache server used on many DSL/Cable routers now
> has a simple DNS Rebinding protection mechanism. When executed with the
> --stop-dns-rebind option the DNS resolver in dnsmasq will filter out
> private IP addresses (127.0.0.0/8, 192.168.0.0/16, 10.0.0.0/8,
> 172.16.0.0/12 and 169.254.0.0/16). This should be sufficient for most
> private/home users.
>
> Feedback welcome.
>
>
> dnsmasq:
> http://www.thekelleys.org.uk/dnsmasq/doc.html
>
>
> dnsmasq with dns rebinding protection:
> http://www.thekelleys.org.uk/dnsmasq/test-releases/dnsmasq-2.41test11.tar.gz
>
> orginal patch:
> http://www.mulliner.org/blog/blosxom.cgi/security/dnsmasq_dnsrebinding_protection_patch.html
>

DNS Spoofing problems... aren't in DNS.
Nevermind thanks for the fix, it's a good idea, and going to help anyway.

I hope Adobe (and some others) hear you. (^-^)

-- 
Guasconi Vincent
Etudiant.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to