On 2013-05-10 15:36, Josh Bitto wrote:
I'm getting in my system logs the following:

firewall dnsmasq[35138]: possible DNS-rebind attack detected: okanagan.bc.ca

Is this something to worry about? I've looked at the forums and most people say to disable the rebind option in the system settings. I'm kinda concerned if this is a serious log or if it is just a false positive. Or if it's just an attempt and I have nothing to worry about. Can anyone give me some insight into this?




Is your organization's network affiliated with okanagan.bc.ca in any way? I'll assume not, but that might not be entirely correct given the geographical proximity.

Assuming not, from the looks of it it's possible that it is designed as an attack but it's more likely that okanagan.bc.ca has simply screwed up their DNS. Either way, okanagan.bc.ca's internet-facing DNS records are not set correctly:

okanagan.bc.ca.         3600    IN      A       10.1.33.0
okanagan.bc.ca.         3600    IN      A       142.23.95.114
;; Received 75 bytes from 142.23.79.254#53(142.23.79.254) in 99 ms

They shouldn't be leaking a 10/8 address out to the internet, since they are, you'll (correctly) get DNS-rebind attack warnings approximately 50% of the time when someone visits okanagan.bc.ca from within your internal network.

You can likely ignore the warnings entirely, either 1) They're warning you about a mis-configuration out on the net, or 2) You were just protected against an attack.

Either way, everything worked the way it's supposed to. There's absolutely no upside to disabling DNS rebinding attack detection unless your networks are supposed to be interconnected and you are supposed to be able to access each other's internal IPs.

--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren

_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to