Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No access to webinterface "Potential DNS Rebind attack detected" since July/3

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    43 Posts 10 Posters 29.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      I'm not sure how that would have triggered the check, since the rebinding checks are skipped if you access it by IP address.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • F
        fundutzi
        last edited by

        I still get this message when trying to access on "https://pub.SomeDomain.eu:TCPport". No issues when using "https://publicIP:TCPport".

        I tested on two installs different locations. Both on:
        2.0-BETA5 (i386)
        built on Sun Feb 6 13:03:57 EST 2011

        Not an issue for me, a bit of feedback if it may help.

        Regards,

        2.0-Beta5 (i386)- build xxx
        as vmHw 7 always E1000 nics
        on
        VMware ESX 4.x,

        1 Reply Last reply Reply Quote 0
        • C
          cmb
          last edited by

          @fundutzi:

          I still get this message when trying to access on "https://pub.SomeDomain.eu:TCPport".

          Then you should, there aren't any issues with it anymore. See info here:
          http://doc.pfsense.org/index.php/DNS_Rebinding_Protections

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.