gpt4 book ai didi

dns - java 应用程序中主机的前向和后向 DNS 条目如何匹配,使其免受 DNS 欺骗

转载 作者:行者123 更新时间:2023-12-02 09:23:48 32 4
gpt4 key购买 nike

我正在使用 fortify,它显示了攻击者可以在我尝试在 java 应用程序中获取主机名时进行 DNS 欺骗的漏洞。我有一个解决方案,通过匹配正向 DNS 和反向 DNS 条目可以避免这种情况。但它有什么用处以及如何实现它,我无法找到它。Fortify 在这一行显示漏洞

Link for line

Fortify 显示如下建议:

Recommendations:

You can increase confidence in a domain name lookup if you check to make sure that the host's forward and backward DNS entries match. Attackers will not be able to spoof both the forward and the reverse DNS entries without controlling the nameservers for the target domain. This is not a foolproof approach however: attackers may be able to convince the domain registrar to turn over the domain to a malicious nameserver. Basing authentication on DNS entries is simply a risky proposition.

感谢任何帮助,也欢迎其他解决方案。

提前致谢。

最佳答案

我认为它是这样的:

    final String hostname = "google.com";
final String ipAddress = "123.123.123.123";
final InetAddress byIpAddress = InetAddress.getByName(ipAddress);
boolean forwardCheck = byIpAddress.getHostName().equals(hostname);
final InetAddress byHostName = InetAddress.getByName(hostname);
boolean reverseCheck = byHostName.getHostAddress().equals(ipAddress);
if (reverseCheck && forwardCheck) {
// perform your logic
}

关于dns - java 应用程序中主机的前向和后向 DNS 条目如何匹配,使其免受 DNS 欺骗,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/43523557/

32 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com