On Monday, 6 March 2023 12:05:40 GMT Wols Lists wrote:
> On 06/03/2023 11:08, Peter Humphrey wrote:
> > On Monday, 6 March 2023 10:56:37 GMT Wols Lists wrote:
> >> On 06/03/2023 10:06, Michael wrote:
> >>> I suspect the behaviour you noticed is related to FF functionality like
> >>> TRR
> >>> (Trusted Recursive Resolver) farming all your DNS queries over to the
> >>> cloudfarce honeypot.
> >>> 
> >>> Have a look here if you want to disable it:
> >>> 
> >>> https://wiki.archlinux.org/title/Firefox/Privacy#Disable/
> >>> enforce_'Trusted_Recursive_Resolver'
> >> 
> >> Thanks. That led me to network.trr.allow-rfc1918, which provided your
> >> name has a dot in it ! appears to resolve addresses from /etc/hosts. I
> >> guess that actually means firefox uses your local resolver first, and if
> >> it returns an rfc1918 address, will use it.
> >> 
> >> Surely that should be the default! It shouldn't break a PRIVATE network
> >> in the name of security !!!
> > 
> > It is the default here, in www-client/firefox-110.0.1 .
> 
> I'm running amd not ~amd, and I've got FF 102esr. As soon as I changed
> it to allow rfc1918, it started working ...
> 
> Cheers,
> Wol

As I understand it the purpose of this setting is to avoid web attacks being 
able to redirect to local private addresses, which may be hosting vulnerable 
services - a.k.a. 'DNS-rebinding'.  The default setting is 'false' in FF 
102.8.0, but if you have disabled TRR it appears the effects of 
network.trr.allow-rfc1918 are disabled too.

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to