Enforcing minimum TTL...
Grant Taylor
gtaylor at tnetconsulting.net
Fri Oct 26 03:50:52 UTC 2018
On 10/25/2018 09:27 PM, Mark Andrews wrote:
> Use a browser that maintains its own address cache tied to the HTTP
> session. That is the only way to safely deal with rebinding attacks.
> Rebinding attacks have been known about for years. There is zero excuse
> for not using a browser with such protection.
That is sound advice.
Unfortunately it does not answer my question of is there a way to
enforce a minimum TTL (with BIND).
Nor does it protect less intelligent browsers or (IoT) devices.
--
Grant. . . .
unix || die
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3982 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20181025/b78207db/attachment.bin>
More information about the bind-users
mailing list