Trusting Self-reported DNS Name |
Weakness ID: 292 (Weakness Variant) | Status: Incomplete |
Description Summary
Scope | Effect |
---|---|
Authentication | Malicious users can fake authentication information by providing false DNS information. |
Example 1
The following code uses a DNS lookup to determine whether or not an inbound request is from a trusted host. If an attacker can poison the DNS cache, they can gain trusted status.
Example 2
Reference | Description |
---|---|
CVE-2009-1048 | VOIP product allows authentication bypass using 127.0.0.1 in the Host header. |
Phase: Architecture and Design Use other means of identity verification that cannot be simply spoofed. Possibilities include a username/password or certificate. |
As DNS names can be easily spoofed or misreported, they do not constitute a valid authentication mechanism. Alternate methods should be used if the significant authentication is necessary. In addition, DNS name resolution as authentication would -- even if it was a valid means of authentication -- imply a trust relationship with the DNS servers used, as well as all of the servers they refer to. IP addresses are more reliable than DNS names, but they can also be spoofed. Attackers can easily forge the source IP address of the packets they send, but response packets will return to the forged IP address. To see the response packets, the attacker has to sniff the traffic between the victim machine and the forged IP address. In order to accomplish the required sniffing, attackers typically attempt to locate themselves on the same subnet as the victim machine. Attackers may be able to circumvent this requirement by using source routing, but source routing is disabled across much of the Internet today. In summary, IP address verification can be a useful part of an authentication scheme, but it should not be the single factor required for authentication. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 290 | Authentication Bypass by Spoofing | Development Concepts (primary)699 Research Concepts (primary)1000 |
PeerOf | ![]() | 291 | Trusting Self-reported IP Address | Research Concepts1000 |
PeerOf | ![]() | 293 | Using Referer Field for Authentication | Research Concepts1000 |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
89 | Pharming |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
CLASP | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Demonstrative Examples | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Observed Examples |