Simon Kelley
2018-09-08 17:17:51 UTC
https://www.kb.cert.org/vuls/id/598349
The essence of this is that an attacker can get a DHCP lease whilst
claiming the name "wpad" and thus insert the name wpad.example.com in
the local DNS pointing the attacker's machine. The presence of that A
record allows control of the proxy settings of any browser in the network.
It's already possible to mitigate this: adding
0.0.0.0 wpad wpad.example.com
:: wpad.wpad.example.com
to /etc/hosts will generate harmless A and AAAA records which override
those that may be created by DHCP leases.
The currently unreleased 2.80 version of dnsmasq adds the
dhcp-name-match option, which allows
dhcp-name-match=set:wpad-ignore,wpad
dhcp-ignore-names=tag:wpad-ignore
Which stops the attack at source.
The question is, should the above configuration be "baked in" to the code?
Cheers,
Simon.
The essence of this is that an attacker can get a DHCP lease whilst
claiming the name "wpad" and thus insert the name wpad.example.com in
the local DNS pointing the attacker's machine. The presence of that A
record allows control of the proxy settings of any browser in the network.
It's already possible to mitigate this: adding
0.0.0.0 wpad wpad.example.com
:: wpad.wpad.example.com
to /etc/hosts will generate harmless A and AAAA records which override
those that may be created by DHCP leases.
The currently unreleased 2.80 version of dnsmasq adds the
dhcp-name-match option, which allows
dhcp-name-match=set:wpad-ignore,wpad
dhcp-ignore-names=tag:wpad-ignore
Which stops the attack at source.
The question is, should the above configuration be "baked in" to the code?
Cheers,
Simon.