-
Notifications
You must be signed in to change notification settings - Fork 262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some servers filter responses with intranet IP addresses #813
Comments
## sby-limotelu
non-censoring, non-logging, DNSSEC-capable Hosted in Surabaya, Indonesia (Dnscrypt) https://limotelu.org maintained by poentodewo (https://github.com/poentodewo)
sdns://AQcAAAAAAAAAEzE5OS4xODAuMTMwLjM5Ojg0NDMg1U5MYSDK58uVdJ8dKtp0UZaCKSG0znwQLVHYKk1QyuwcMi5kbnNjcnlwdC1jZXJ0LnNieS1saW1vdGVsdQ # dnslookup local.03k.org sdns://AQcAAAAAAAAAEzE5OS4xODAuMTMwLjM5Ojg0NDMg1U5MYSDK58uVdJ8dKtp0UZaCKSG0znwQLVHYKk1QyuwcMi5kbnNjcnlwdC1jZXJ0LnNieS1saW1vdGVsdQ
dnslookup v1.9.1
dnslookup result (elapsed 16.285129805s):
;; opcode: QUERY, status: REFUSED, id: 52879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 2
;; OPT PSEUDOSECTION:
; EDNS: version 0; flags:; udp: 1232
; EDE: 18 (Prohibited): (EIM4)
;; QUESTION SECTION:
;local.03k.org. IN A
;; ADDITIONAL SECTION:
explanation.invalid. 10800 IN TXT "blocked by DNS rebinding protection" |
Furthermore, I believe that this behavior can be detected using a script and can be addressed by running periodic checks through actions. These checks can remove the "No filter" label from these servers. |
Hi! And thanks for reporting this! Indeed, it is not expected to block local IP addresses when the "no filter" flag is set. And this is causing more issues that it solves. I'll run a scan of the servers for that. Thanks again! |
I tested all DNS servers using a simple script to get a list of some DNS servers that will filter, I hope this helps. |
Good catch! |
Okay, let's play a little game. It's that time of year again, you know, when the urge to resurrect old arguments hits like a holiday hangover. This year's victim? Why is that list of lying DNS resolvers are not resolving private IPs, of course! So, I ask you, my friend, why on earth would a public DNS resolver be bothered with your little local network? Seriously, who's asking for 10.9.8.7 to be looked up on some random server? It's just weird with a bunch of security and privacy implications. I mean, it's called a "private" network for a reason, right? A sanctuary for your internal devices to gossip amongst themselves, blissfully unaware of the outside world. Before you go running scripts and adding tags like you're redecorating a haunted house, maybe take a peek at these: https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Filters#dns-rebinding-protection |
Thank you for your response, but I’d like to respectfully address a few points regarding the filtering of private IPs by DNS resolvers that claim to be “non-filtering.” 1. Commitment to TransparencyWhen a public DNS resolver advertises itself as “non-filtering,” it creates an expectation of neutrality and transparency. If such a resolver is filtering requests to private IP addresses, that constitutes a form of filtering, even if it is framed as a security measure.
2. Legitimate Use Cases for Private IP ResolutionWhile private IPs are typically used within local networks, there are valid scenarios where resolving them via public DNS servers is necessary:
3. Distinguishing DNS Rebinding RisksYou cited DNS Rebinding as a justification for filtering private IPs. However, DNS Rebinding attacks rely on malicious domain names resolving to private IPs, typically targeting browser vulnerabilities.
4. Balancing Security and User AwarenessThe key issue isn’t whether filtering is “bad” or unnecessary—it’s the lack of transparency. If filtering is implemented for private IPs, users should be informed clearly and upfront, so they can understand and evaluate the trade-offs involved.
5. Looking to Industry StandardsIf we’re searching for best practices in handling these scenarios, it’s worth examining what leading DNS providers are doing. Major providers like Google Public DNS and Cloudflare’s 1.1.1.1 do not filter private IP addresses by default.
|
@dct-infra Let me provide a real-world use case: an organization needs to connect to a VPN to access internal resources, such as an internal website with an HTTPS connection that resolves to a private IP address. Under modern browser standards, HTTPS is mandatory for certain APIs, like Clearly, if I use most basic open-source solutions—such as the OpenVPN client—there’s no built-in functionality to hijack local DNS or modify the |
I'm so busy with filtering today so I'll get right to the point.
|
@dct-infra While modern HTTPS security standards have made older DNS rebinding attacks harder to execute, as you mentioned, if ethical standards are to be used for filtering, I believe you can manually add the required address blocks from the DNSCrypt documentation you referenced, or propose default filtering in client settings, much like the default DNS rebinding protection option in OpenWRT. Filtering behavior should occur at the client side, not at the public DNS server. As noted in the DNSCrypt documentation you shared, certain applications (like Plex) require disabling rebinding protection to correctly detect local clients. In fact, I believe the discussion should not even focus on whether filtering is necessary, security concerns, or ethical implications—filtering is just filtering, as simple as 1=1, don’t you think? |
unsubscribe
Am 18. Dezember 2024 08:36:55 MEZ schrieb kissshot ***@***.***>:
…
@dct-infra
RFC 1918 defines the range of private address blocks, but resolving domain names to private addresses does not violate any explicitly defined behavior in RFC standards.
While modern HTTPS security standards have made older DNS rebinding attacks harder to execute, as you mentioned, if ethical standards are to be used for filtering, I believe you can manually add the required address blocks from the DNSCrypt documentation you referenced, or propose default filtering in client settings, much like the default DNS rebinding protection option in OpenWRT. Filtering behavior should occur at the client side, not at the public DNS server. As noted in the DNSCrypt documentation you shared, certain applications (like Plex) require disabling rebinding protection to correctly detect local clients.
In fact, I believe the discussion should not even focus on whether filtering is necessary, security concerns, or ethical implications—filtering is just filtering, as simple as 1=1, don’t you think?
Filtering is an objective fact. If you think this filtering is different from other types of filtering, you can even propose adding diversified "filtering type" labels.
--
Reply to this email directly or view it on GitHub:
#813 (comment)
You are receiving this because you commented.
Message ID: ***@***.***>
|
I've noticed that certain server are filtering intranet domain names and returning empty records when the resolved IP address is a private address. One such server is jp.tiar.app. I suspect that this filtering is implemented for security reasons. However, can we consider these server as having "filter=false" behavior?
To reproduce the issue, you can test it with the following domain name: local.03k.org (10.9.8.7).
The text was updated successfully, but these errors were encountered: