Hi Everyone,

I'm examining a webapp which had a scan looking for security related
errata and vulnerabilities. The app is hosted on Google Cloud (GPC)
and the webserver is Nginx. Only the app was scanned. GPC and Nginx
were not scanned.

The scan produced an interesting finding I have not seen before. The
finding is, a HTTP Request using a fake Host: header produces a DNS
lookup. I think the concern is a DNS amplification attack (or maybe
just some extra traffic).

I think this is how the errata or attack works. Below, theHost: header
is different from the hostname at the TLS layer.

    echo -e "GET / HTTP/1.1\r\nHost:www.fake-example.com\r\n\r\n" | \
    openssl s_client -connect www.example.com:443 -servername www.example.com

My question is, is Nginx expected to perform a lookup for www.fake-example.com?

(At this point I have not ruled out GPC doing the DNS lookup. Nginx
has a public mailing list, so it is easier to start here than trying
to use Google {non-}support).

Jeff
_______________________________________________
nginx mailing list -- nginx@nginx.org
To unsubscribe send an email to nginx-le...@nginx.org

Reply via email to