[22575] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ProFTPd and reverse DNS

daemon@ATHENA.MIT.EDU (Peter van Dijk)
Sat Sep 8 15:47:44 2001

Date: Sat, 8 Sep 2001 12:35:25 +0200
From: Peter van Dijk <peter@dataloss.nl>
To: bugtraq@securityfocus.com
Message-ID: <20010908123525.D93229@dataloss.nl>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010907153827.P20505@techmonkeys.org>; from poptix@techmonkeys.org on Fri, Sep 07, 2001 at 03:38:27PM -0600

On Fri, Sep 07, 2001 at 03:38:27PM -0600, Matthew S . Hallacy wrote:
> Howdy,
> 
> 	Recently while browsing through security logs I noticed that quite a few of the hosts
> connecting to the machine did not resolve, I've checked into it, and apparently ProFTPd does
> not check forward to reverse DNS mappings, and only resolves the IP address connecting. This
> could easily lead to an attacker hiding his real hostname from logfiles, or an attacker 
> slipping through ACL's by modifying their hostname. For the time being I recommend that the
> option 'UseReverseDNS' be disabled in the configuration file until this is fixed.

Any network server should log the IP of all incoming connections. Also
resolving the reverse name for that IP can be informative, but is
never as relevant as the IP.

Even if you do check forward and reverse mappings, DNS is easier to
spoof then a real TCP session. Also, an attacker might arrange for a
reverse and forward mapping with a very low TTL, and after the attack
make sure those point somewhere else.

The mantra is simple: log IPs. Always.

Greetz, Peter
-- 
Monopoly        http://www.dataloss.nl/monopoly.html

home help back first fref pref prev next nref lref last post