You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bad news, there is a vulnerability in the ldns_blocking plugin.
An IPv4 address present in the set of IPs to blocked will be blocked for an A query.
However, IPv4 addresses can also be encoded as IPv6 addresses. For example ::ffff:216.58.201.142 is equivalent to 216.58.201.142.
With an AAAA record containing such an IPv4-in-IPv6 address, the ldns_blocking plugin will not spot the IPv4 address and let the query go through.
CUrl is an example of a client that will connect to the IPv4 address even though it was obtained from an AAAA record, and I guess many HTTP clients and browsers will behave the same way. A malicious website can thus bypass IP-based DNS filters.
The text was updated successfully, but these errors were encountered:
Bad news, there is a vulnerability in the
ldns_blocking
plugin.An IPv4 address present in the set of IPs to blocked will be blocked for an
A
query.However, IPv4 addresses can also be encoded as IPv6 addresses. For example
::ffff:216.58.201.142
is equivalent to216.58.201.142
.With an
AAAA
record containing such an IPv4-in-IPv6 address, theldns_blocking
plugin will not spot the IPv4 address and let the query go through.CUrl is an example of a client that will connect to the IPv4 address even though it was obtained from an
AAAA
record, and I guess many HTTP clients and browsers will behave the same way. A malicious website can thus bypass IP-based DNS filters.The text was updated successfully, but these errors were encountered: