11.07.2015 Views

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Fielding</strong>, et al. Standards Track [Page 153]RFC <strong>2616</strong> HTTP/1.1 June 199915.3 DNS SpoofingClients using HTTP rely heavily on the Domain Name Service, and arethus generally prone to security attacks based on the deliberatemis-association of IP addresses and DNS names. Clients need to becautious in assuming the continuing validity of an IP number/DNS nameassociation.In particular, HTTP clients SHOULD rely on their name resolver <strong>for</strong>confirmation of an IP number/DNS name association, rather thancaching the result of previous host name lookups. Many plat<strong>for</strong>msalready can cache host name lookups locally when appropriate, andthey SHOULD be configured to do so. It is proper <strong>for</strong> these lookups tobe cached, however, only when the TTL (Time To Live) in<strong>for</strong>mationreported by the name server makes it likely that the cachedin<strong>for</strong>mation will remain useful.If HTTP clients cache the results of host name lookups in order toachieve a per<strong>for</strong>mance improvement, they MUST observe the TTLin<strong>for</strong>mation reported by DNS.If HTTP clients do not observe this rule, they could be spoofed whena previously-accessed server's IP address changes. As networkrenumbering is expected to become increasingly common [24], thepossibility of this <strong>for</strong>m of attack will grow. Observing thisrequirement thus reduces this potential security vulnerability.This requirement also improves the load-balancing behavior of clients<strong>for</strong> replicated servers using the same DNS name and reduces thelikelihood of a user's experiencing failure in accessing sites whichuse that strategy.15.4 Location Headers and SpoofingIf a single server supports multiple organizations that do not trustone another, then it MUST check the values of Location and Content-Location headers in responses that are generated under control ofsaid organizations to make sure that they do not attempt toinvalidate resources over which they have no authority.15.5 Content-Disposition IssuesRFC 1806 [35], from which the often implemented Content-Disposition(see section 19.5.1) header in HTTP is derived, has a number of very

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!