Enforcing minimum TTL...

Grant Taylor gtaylor at tnetconsulting.net
Fri Oct 26 03:50:52 UTC 2018


On 10/25/2018 09:27 PM, Mark Andrews wrote:
> Use a browser that maintains its own address cache tied to the HTTP 
> session.  That is the only way to safely deal with rebinding attacks. 
> Rebinding attacks have been known about for years.  There is zero excuse 
> for not using a browser with such protection.

That is sound advice.

Unfortunately it does not answer my question of is there a way to 
enforce a minimum TTL (with BIND).

Nor does it protect less intelligent browsers or (IoT) devices.



-- 
Grant. . . .
unix || die

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3982 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20181025/b78207db/attachment.bin>


More information about the bind-users mailing list