Use a browser that maintains its own address cache tied to the HTTP session.  
That is the only way to safely deal with rebinding attacks.  Rebinding attacks 
have been known about for years.  There is zero excuse for not using a browser 
with such protection.

> On 26 Oct 2018, at 12:02 pm, Grant Taylor via bind-users 
> <bind-users@lists.isc.org> wrote:
> 
> Is there a way to enforce a minimum TTL?
> 
> My initial searching indicated that ISC / BIND developers don't include a way 
> to do so on a matter of principle.
> 
> I'd like to enforce a minimum TTL of 5 minutes (300 seconds) on my private 
> BIND server at home.  I'm wanting to use this as a method to thwart DNS 
> Rebinding attacks.
> 
> I've already got RPZ filtering out what IANA defines as Special Purpose IPv4 
> addresses.  But this does nothing to prevent rebinding to a different IP on 
> the globally routed Internet, or squatters that are re-using someone else's 
> IP space (i.e. ISP's abusing DoD IP space for CGN).
> 
> 
> 
> -- 
> Grant. . . .
> unix || die
> 
> 
> 
> _______________________________________________
> Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
> from this list
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742              INTERNET: ma...@isc.org

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to