DNS rebinding attacks

DNS rebinding attacks

[1] Protecting Browsers from DNS Rebinding Attacks ( 版) <http://www.adambarth.com/papers/2009/jackson-barth-bortz-shao-boneh-tweb.pdf>

[2] 689835 – Dns rebinding attack using cached resources ( ()) <https://bugzilla.mozilla.org/show_bug.cgi?id=689835#c9>

It's not feasible for the browser to protect the user from DNS rebinding attacks. Servers need to protect themselves by validating the Host header and firewalls need to protect themselves by preventing external names from resolving to internal IP addresses.

[3] DNS Rebinding ( ()) <https://crypto.stanford.edu/dns/>

[4] Issue 98357 - chromium - Security: browser dns rebinding attack using cached resources - Monorail ( ()) <https://bugs.chromium.org/p/chromium/issues/detail?id=98357>

[5] 149943 – Use "DNS pinning" to prevent Princeton-like exploits ( ()) <https://bugzilla.mozilla.org/show_bug.cgi?id=149943>

[6] DNS rebinding - Wikipedia () <https://en.wikipedia.org/wiki/DNS_rebinding>

[7] Goによるプライベートネットワークへのアクセスを禁止するHTTPクライアントの実装 - はこべにっき ♨ () <http://hakobe932.hatenablog.com/entry/2015/08/05/093000>