<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: dnsrebinding</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/dnsrebinding.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2007-08-02T12:53:59+00:00</updated><author><name>Simon Willison</name></author><entry><title>(somewhat) breaking the same-origin policy by undermining dns-pinning</title><link href="https://simonwillison.net/2007/Aug/2/shampoo/#atom-tag" rel="alternate"/><published>2007-08-02T12:53:59+00:00</published><updated>2007-08-02T12:53:59+00:00</updated><id>https://simonwillison.net/2007/Aug/2/shampoo/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://shampoo.antville.org/stories/1451301/"&gt;(somewhat) breaking the same-origin policy by undermining dns-pinning&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
This is the best technical explanation of the DNS rebinding attack I’ve seen. The linked demo worked for me in Safari but not in Camino.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/camino"&gt;camino&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/dnsrebinding"&gt;dnsrebinding&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/safari"&gt;safari&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/samedomain"&gt;samedomain&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="camino"/><category term="dnsrebinding"/><category term="safari"/><category term="samedomain"/><category term="security"/></entry><entry><title>Your browser is a tcp/ip relay</title><link href="https://simonwillison.net/2007/Aug/2/relay/#atom-tag" rel="alternate"/><published>2007-08-02T12:53:11+00:00</published><updated>2007-08-02T12:53:11+00:00</updated><id>https://simonwillison.net/2007/Aug/2/relay/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://radar.oreilly.com/archives/2007/08/your_web_browse.html"&gt;Your browser is a tcp/ip relay&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Thoroughly nasty new(ish) attack that breaks the same-domain policy and allows intranet content to be stolen by a malicious site. Using virtual hosts (hence requiring the Host: header) is the best known protection.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/arturbergman"&gt;arturbergman&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/dnsrebinding"&gt;dnsrebinding&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/samedomain"&gt;samedomain&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="arturbergman"/><category term="dnsrebinding"/><category term="samedomain"/><category term="security"/></entry></feed>