{"id":4871,"date":"2018-08-27T14:40:12","date_gmt":"2018-08-27T12:40:12","guid":{"rendered":"https:\/\/www.boc.de\/watchguard-info-portal\/?p=4871"},"modified":"2018-10-24T14:05:38","modified_gmt":"2018-10-24T12:05:38","slug":"dnswatch-fuehrt-schutz-gegen-dns-rebinding-ein","status":"publish","type":"post","link":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2018\/08\/dnswatch-fuehrt-schutz-gegen-dns-rebinding-ein\/","title":{"rendered":"DNSWatch f\u00fchrt Schutz gegen DNS-Rebinding ein"},"content":{"rendered":"<header class=\"meta\">\n<p class=\"blog-title\"><span style=\"font-size: inherit;\">DNS-Rebinding Attacken sind ein altbekanntes Problem, aber immer noch aktuell.\u00a0\u00a0Bei dieser Art von Angriffen wird versucht, durch gef\u00e4lschte DNS Antworten Zugriff auf interne Ressourcen zu erlangen. Der Angreifer ben\u00f6tigt dazu nicht mehr als eine Domain mit Schadcode und einen Nameserver, der s\u00e4mtliche DNS Anfragen f\u00fcr die Angreiferseite beantwortet.<\/span><\/p>\n<\/header>\n<p><!--more--><\/p>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>Um vor solchen Attacken gesch\u00fctzt zu sein, hat WatchGuard f\u00fcr\u00a0<a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/produktinfos\/watchguard-security-services-und-suites\/watchguard-dnswatch\/\" target=\"_blank\" rel=\"noopener\">DNSWatch<\/a> die neue Funktion &#8220;DNS binding protection&#8221; eingef\u00fchrt, welche in den <a href=\"https:\/\/dnswatch.watchguard.com\/settings\/service\/\" target=\"_blank\" rel=\"noopener\">DNSWatch Settings<\/a> aktiviert werden kann. Nach der Aktivierung kann es bis zu einer Stunde dauern bis die Einstellung aktiv ist.<\/p>\n<p>Um zu sehen ob die Einstellung aktiv ist, k\u00f6nnen Sie &#8216;local.strongarm.io&#8217; aufrufen. Wenn &#8220;DNS binding protection&#8221; NICHT aktiv ist, bekommen Sie &#8216;192.168.1.1&#8217; zur\u00fcck. Wenn\u00a0&#8220;DNS binding protection&#8221; aktiv ist, gibt DNSWatch eine NXDOMAIN zur\u00fcck.<\/p>\n<p>Wenn Sie einen externen Nameserver benutzen um Intranetseiten zu hosten, sollten Sie diese Domains auf einen internen Nameserver umziehen, um Sie vor DNS-Rebindung Angriffen zu sch\u00fctzen.<\/p>\n<p>anbei die Original-Meldung von WatchGuard:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<blockquote><p><em>Despite being around for many years,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/DNS_rebinding\">\u201cDNS Rebinding\u201d<\/a>\u00a0attacks have been\u00a0<a href=\"https:\/\/medium.com\/@brannondorsey\/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325\">making<\/a>\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2018\/06\/google-to-fix-location-data-leak-in-google-home-chromecast\/\">headlines<\/a>\u00a0<a href=\"https:\/\/www.wired.com\/story\/chromecast-roku-sonos-dns-rebinding-vulnerability\/\">recently<\/a>. Commodity devices (Chromecast, Roku, Sonos Speakers, and many other IoT devices) are potentially vulnerable, and while the popular ones have been patched, it\u2019s hard to know if they all have.<\/em><\/p>\n<p><em>This trend, combined with direct feedback from other customers, has led us to build new protections into DNSWatch to address these types of attacks.<\/em><\/p>\n<p><em>You can enable the DNS binding protections in\u00a0<a href=\"https:\/\/dnswatch.watchguard.com\/settings\/service\/\">your DNSWatch settings<\/a>. Once you enable the feature, it can take up to an hour to take effect due to DNS caching.<\/em><\/p>\n<p><em>When enabled, any responses that would normally contain an A record for a private IP address (192.168.0.0\/16, 10.0.0.0\/8, 172.16.0.0\/12) will instead result in an NXDOMAIN.<\/em><\/p>\n<p><em>To confirm the rebinding protection is enabled, you can look up `local.strongarm.io`. If rebinding is enabled, it will return `192.168.1.1`. If the rebinding protection is enabled, DNSWatch will return an NXDOMAIN.<\/em><\/p>\n<p><em>If you use an external nameserver to host intranet websites, you need to move those domains to an internal name server to protect them from DNS Rebinding attacks.<\/em><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>DNS-Rebinding Attacken sind ein altbekanntes Problem, aber immer noch aktuell.\u00a0\u00a0Bei dieser Art von Angriffen wird versucht, durch gef\u00e4lschte DNS Antworten Zugriff auf interne Ressourcen zu erlangen. Der Angreifer ben\u00f6tigt dazu nicht mehr als eine Domain mit Schadcode und einen Nameserver, der s\u00e4mtliche DNS Anfragen f\u00fcr die Angreiferseite beantwortet.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[445],"tags":[463,437],"class_list":["post-4871","post","type-post","status-publish","format-standard","hentry","category-aktuelle-nachrichten","tag-dns-rebinding","tag-dnswatch"],"_links":{"self":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/4871"}],"collection":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/comments?post=4871"}],"version-history":[{"count":9,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/4871\/revisions"}],"predecessor-version":[{"id":5431,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/4871\/revisions\/5431"}],"wp:attachment":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/media?parent=4871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/categories?post=4871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/tags?post=4871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}