On 10/22/07, Collin R. Mulliner <[EMAIL PROTECTED]> wrote: > dnsmasq (http://www.thekelleys.org.uk/dnsmasq/doc.html) a popular DHCP > and DNS forwarder and cache server used on many DSL/Cable routers now > has a simple DNS Rebinding protection mechanism. When executed with the > --stop-dns-rebind option the DNS resolver in dnsmasq will filter out > private IP addresses (127.0.0.0/8, 192.168.0.0/16, 10.0.0.0/8, > 172.16.0.0/12 and 169.254.0.0/16). This should be sufficient for most > private/home users. > > Feedback welcome. > > > dnsmasq: > http://www.thekelleys.org.uk/dnsmasq/doc.html > > > dnsmasq with dns rebinding protection: > http://www.thekelleys.org.uk/dnsmasq/test-releases/dnsmasq-2.41test11.tar.gz > > orginal patch: > http://www.mulliner.org/blog/blosxom.cgi/security/dnsmasq_dnsrebinding_protection_patch.html >
DNS Spoofing problems... aren't in DNS. Nevermind thanks for the fix, it's a good idea, and going to help anyway. I hope Adobe (and some others) hear you. (^-^) -- Guasconi Vincent Etudiant. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/