OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Archive »
  • 22.1 Legacy Series »
  • DNS Rebind Attack - IP used
« previous next »
  • Print
Pages: [1]

Author Topic: DNS Rebind Attack - IP used  (Read 2569 times)

junicast

  • Newbie
  • *
  • Posts: 10
  • Karma: 0
    • View Profile
DNS Rebind Attack - IP used
« on: January 29, 2022, 09:09:32 pm »
Hi,

I run an OPNsense device virtualized on proxmox and I try to connect to it via IPv6 address. When I do it shows the following message.

Code: [Select]
Warning: array_pop() expects parameter 1 to be array, null given in /usr/local/etc/inc/authgui.inc on line 74

A potential DNS Rebind attack has been detected.
Try to access the router by IP address instead of by hostname. You can disable this check if needed under System: Settings: Administration.

As I'm accessing the device by IP I wonder what this is about.
Logged

tiermutter

  • Hero Member
  • *****
  • Posts: 1103
  • Karma: 61
    • View Profile
Re: DNS Rebind Attack - IP used
« Reply #1 on: January 29, 2022, 10:48:25 pm »
Same here.
Connection to global LAN address is working, but gives me the php error.
Connection to ULA LAN address shows the rebind attack warning and also the php error.

I also noticed that it is no longer possible to connect to VPN server from LAN using the global WAN address.
Logged
i am not an expert... just trying to help...

debitux

  • Newbie
  • *
  • Posts: 4
  • Karma: 0
    • View Profile
Re: DNS Rebind Attack - IP used
« Reply #2 on: February 10, 2022, 01:02:24 pm »
Same for me. I had to manually disable the DNS rebind check in config.xml and reboot to regain webaccess to my OPNsense after upgrade.
Logged

Fright

  • Hero Member
  • *****
  • Posts: 1777
  • Karma: 164
    • View Profile
Re: DNS Rebind Attack - IP used
« Reply #3 on: February 10, 2022, 01:37:23 pm »
seems fixed in 130ef3a
https://github.com/opnsense/core/commit/130ef3a6e73b7c211c8f9deec2401117e2245496
Logged

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • Archive »
  • 22.1 Legacy Series »
  • DNS Rebind Attack - IP used
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2