Questions tagged [dns]
The Domain Name System (DNS) translates Internet domain and host names to IP addresses.
806 questions
1 vote
1 answer
63 views
How to safely determine if an IDN (International Domain Name) simply redirects to the non-IDN equivalent domain name or is an imposter site?
In this old InfoSec SE question regarding IDNs (International Domain Names), the OP asks if companies should "actively seek out and register domains in alternative (similar looking) character ...
1 vote
1 answer
125 views
Are there any techniques that would compromise private DNS by checking connections in reverse currently
I'm a new user. I know some things about computer systems. I have a secure Domain Name System resolver server connection set up on this tablet device, a DNS over HTTPS connection - but I use a shared ...
0 votes
2 answers
141 views
Do ISPs track/log DNS lookups to their DNS servers? [closed]
Has there been any evidence that ISPs track/log DNS look-ups to the DNS servers they operate and supply for their own users? Some of OpenNIC's public servers keep logs, so DNS servers can log (and ...
1 vote
1 answer
92 views
Entered a DKIM selector in DNS record that doesn't exit in Exchange 365 email. Will this cause problems?
My MSP supports a sub company where the parent company is supported by a different MSP. We've been working with them to increase security, so we wanted to implement DKIM for email. We have access to ...
1 vote
0 answers
64 views
Arpspoof unintended behaviour
First of all, I've enabled IP forwarding by setting the kernel parameter with sudo sysctl -w net.ipv4.ip_forward=1, which is a prerequisite. Then I've executed arpspoof -t 192.168.1.24 192.168.1.1 -i ...
0 votes
1 answer
125 views
How do I obtain a wildcard certificate without programmable DNS provider in ACME?
Can I do this by adding an NS record pointing to a server that serve the TXT record? Possibly co-hosted with my HTTPS application server?
7 votes
2 answers
2k views
Is there a DHCP mechanism for encrypted DNS?
As far as I’m aware, DHCPv4/DHCPv6 only support assigning DNS server IP addresses, which implies that DNS queries will be unencrypted. It looks like some routers support DOH and DOT now (e.g., https://...
0 votes
0 answers
334 views
Am I experiencing a DNS leak?
I’m using ExpressVPN on my Mac. My Little Snitch firewall is showing that several applications, including my browser and a process called expressvpnd, are making requests to DNS servers set by my ISP. ...
1 vote
0 answers
79 views
Separate DNS servers for non-domian hosts and users
In our organization we have 2 Active Directory DCs which also uses as DNS servers for all our infrastructure (user PCs, domain and non-domain servers, wi-fi clients, vpn users). I have doubts about ...
2 votes
0 answers
1k views
What is this suspicious recurring DNS lookup to gooo...ooooogle.com in my DNS logs? [closed]
I just switched my whole home network (about 100 devices, many IoT) to NextDNS.io. Upon checking the logs I noticed some requests recurring every few minutes to: www....
2 votes
2 answers
163 views
How safe is it to open a recusive DoH resolver to the internet?
I understand that open UDP DNS resolvers can be used to amplify DOS. Are there any pit falls such as this I need to be aware of before opening my resolver?
0 votes
1 answer
141 views
Can Google SafeSearch be enforced on a network where a user uses DoH?
As you may know, Google SafeSearch can be, and often is enforced by network admins on their networks. And according to this Google article, this is how it works: Set the DNS entry for www.google.com (...
2 votes
0 answers
101 views
Security Risks of Unprovisioned DNS Records
A review of controls and associated risks identified a use case for DNS deprovisioning procedures. Specifically, an A record was not cleaned up and the domain has embedded the organization's name. ...
1 vote
1 answer
138 views
Hidden MitM DNS Poisoning Attack
Suppose that an ARP poisoning has been done and the attacker is sitting between the victims and the router, all traffic intended for the gateway would now go through attacker. Would the attacker be ...
32 votes
2 answers
6k views
Is LetsEncrypt activity Public?
I often use a random ingress eg. jhjhtdf76753.example.com, working away quietly developing code on this subdomain for months, never creating a public DNS entry for the subdomain. The example.com ...