Development issues regarding the cerowrt test router project
 help / color / mirror / Atom feed
* Re: [Cerowrt-devel] [Dnsmasq-discuss] CERT Vulnerability VU#598349
       [not found] <9f31e843-b8a2-5cbb-8fc8-94b35eb13061@thekelleys.org.uk>
@ 2018-09-18 17:30 ` Dave Taht
  0 siblings, 0 replies; only message in thread
From: Dave Taht @ 2018-09-18 17:30 UTC (permalink / raw)
  To: cerowrt-devel


As best as I recall, cerowrt enabled wpad for itself and thus
was immune to this bug.

Still... do upgrade off of cerowrt if you haven't already?

Simon Kelley <simon@thekelleys.org.uk> writes:

> https://www.kb.cert.org/vuls/id/598349
>
> The essence of this is that an attacker can get a DHCP lease whilst
> claiming the name "wpad" and thus insert the name wpad.example.com in
> the local DNS pointing the attacker's machine. The presence of that A
> record allows control of the proxy settings of any browser in the network.
>
> It's already possible to mitigate this: adding
>
> 0.0.0.0 wpad wpad.example.com
> :: wpad.wpad.example.com
>
> to /etc/hosts will generate harmless A and AAAA records which override
> those that may be created by DHCP leases.
>
>
> The currently unreleased 2.80 version of dnsmasq adds the
> dhcp-name-match option, which allows
>
> dhcp-name-match=set:wpad-ignore,wpad
> dhcp-ignore-names=tag:wpad-ignore
>
> Which stops the attack at source.
>
>
> The question is, should the above configuration be "baked in" to the code?
>
>
>
> Cheers,
>
> Simon.
>
>
>
>
>
>
>
>
> _______________________________________________
> Dnsmasq-discuss mailing list
> Dnsmasq-discuss@lists.thekelleys.org.uk
> http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2018-09-18 17:30 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <9f31e843-b8a2-5cbb-8fc8-94b35eb13061@thekelleys.org.uk>
2018-09-18 17:30 ` [Cerowrt-devel] [Dnsmasq-discuss] CERT Vulnerability VU#598349 Dave Taht

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox