Open thejh opened 4 years ago
Can reverse DNS PTR records be spoofed per-request?
Can reverse DNS PTR records be spoofed per-request?
There are existing attacks that deanonymize users by watching for dns resolves of special case subdomains, and in those cases (where they aren't cached) the dns server could dynamically pick the response. This would possibly allow forging rdns. Ensuring the rdns isn't cached for an ipv4 address seems unrealistic, but I could see it working for ipv6.
The security considerations section says that user consent would be host-specific, but also that DNS rebinding protection would be limited to preventing connections to "private network addresses". There are two big problems with this: