Pekka Savola (pekkas) writes:
> 
>  Thanks for the interesting link.  This certainly shows that "use hostnames 
>  everywhere" idiom that the IETF has been repeating doesn't quite work as 
>  intended in the real life :-)

    Yes it does, it's not a bug, it's a feature.  It does exactly the right
    thing from the point of view of the implementation.  This is, in my
    opinion, the same problem scope as IDN homographic attacks, just one
    level of interaction (App <-> DNS, as opposed to User <-> APP).

    Section 5.2 of the paper suggests:

"Instead of trying to prevent a host name from rebinding 
 from one IP address to another -- a fairly common event --
 a different approach to defending against rebinding is to 
 prevent the attacker from naming the target server."

    IMHO the problem is there, i.e.: fix the application (browser
    javascript/sandboxing mechanisms), don't blame DNS for doing exactly
    what it was intended to do.

    It'd be even more stupid to look up IPs once and stick to those
    during the life of the application (== execution of the Flash code,
    or JS code, which can be anything from a few milliseconds to several
    hours).  The problem is the same as for traditional (read: standalone)
    applications which lookup IPs once and never look them up again.

    Other solutions are outlined such as blocking direct DNS queries to
    the outside world, and/or using DNS software that refuses to relay
    replies containing internal IP addresses from the outside.  That's
    just spoofing protection at the DNS level.
    
    The section on Host Name authorization is interesting, but it's
    a hack.


_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to