#17964: dnsmasq answering requests on public interfaces
---------------------------------------+-----------------------------------
 Reporter:  anonymous                  |      Owner:  developers
     Type:  defect                     |     Status:  new
 Priority:  highest                    |  Milestone:
Component:  base system                |    Version:  Barrier Breaker 14.07
 Keywords:  dns amplification attacks  |
---------------------------------------+-----------------------------------
 OpenWRTs default settings for dnsmasq could allow an attacker to perform
 recursive dns requests on wan interfaces for dnsmasq will answer wildcard
 requests.

 Why is this a hazard?
 http://www.watchguard.com/infocenter/editorial/41649.asp

 It would be advisable to make the result of the following commands a
 default:

 uci set dhcp.@dnsmasq[0].wildcard=0
 uci set dhcp.@dnsmasq[0].interface=lan
 uci commit

 For most home router environments the setting will be sufficient.
 Experts, who are developing more complex configuration will know how to
 use additional interfaces.

 As a matter of fact lUCi does not currently respect wildcard, notinterface
 or interface.

 Another solution could be to block incoming tcp and udp request on port 53
 on external IPs by a default rule. This solution is not advisable, since
 it is only working while the firewall script is up.

--
Ticket URL: <https://dev.openwrt.org/ticket/17964>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to