Jump to:navigation, search
Wiki
































De.png
En.png
Fr.png









DNS Rebinding Prevention

Last adaptation to the version: 14.0.1(01.2025)

New:
  • Zones without a relay are not displayed in the table
notempty
This article refers to a Resellerpreview
Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
Application Nameserver  Area DNS Rebinding Prevention


DNA rebinding attack and prevention

This type of attack attempts to gain access to internal resources using falsified DNS responses.

The attacker needs nothing more than a domain with malicious code and a name server that answers all DNS queries for the attacker site.

The attack is carried out in several steps:
1. the victim is lured to a prepared website whose IP address is only marked as valid for a few seconds.
2. Malicious code is loaded on the website, which starts a new call after the IP address has expired,
3. but which now uses a modified, proprietary DNS server to display an address from the victim's local network as the destination
4. The attacker now has access to the host with the internal IP through his malicious code (e.g. Java script)

DNS rebinding prevention prevents internal IP addresses from the local network from being issued in response to a DNS query.



Configuration

DNS Rebinding Prevention is configured under Applications Nameserver  Area DNS Rebinding Prevention.

Caption Value Description Nameserver UTMuser@firewall.name.fqdnApplications UTM v14.0.1 Namesever DNS Rebinding Prevention-en.pngDNS Rebinding Prevention tab
DNS Rebinding Prevention: On
default
Activates DNS rebinding prevention
Mode: Automatic In the factory settings, all private IP addresses (class A, B and C) are blocked.
The corresponding private IPv6 addresses and the unique local unicast address are also protected in automatic mode.
Custom The addresses can be set manually.
Protected addresses:     All addresses that are protected by the prevention are displayed here.
Saves the settings
Protected aliases
The DNS entries already configured are activated as protected aliases by default.
Only zones for which a relay is configured are displayed. notempty
As of v14.0.1

If the aliases already configured in the Zones tab are to be excluded from protection, they can be deactivated. Off