[nsp-sec] [Fwd: PTR localhost attack?]

Nick Hilliard nick at inex.ie
Sun Aug 9 15:14:32 EDT 2009


> This made me wonder if this is a potential vector for attack.  If the
> rdns of an IP is checked in a poorly written application (ignoring
> forward resolving of localhost via /etc/hosts), and is satisfied it is
> infact localhost, then the IP address would be granted privileges
> normally authorised only to localhost/127.0.0.1.
>
> Has anybody previously come across this?

this sort of attack was all the rage in the early-mid 1990s, during that 
awkward transition where it could no longer be assumed that dns was no 
longer assumed to be controlled by responsible types and ports below 1024 
were safe and so forth.  I seem to remember using it on a couple of 
occasions to regain access to machines whose root passwords had been lost 
or changed without permission or that sort of thing.

Once the trick became common knowledge, rsh/rlogin and similar protocols 
were hardened against it pretty quickly.  There is also code in several 
client resolvers to make noise when they see a/ptr mismatches.

In short, it's an old one, and if you're silly enough to grant access 
authorization on the basis of /etc/hosts or DNS PTRs, then you probably 
deserve to be bitten in the bum anyway.

Nick



More information about the nsp-security mailing list