-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Account for wildcard DNS resolution #6
Comments
What do we want to do here? Just add another field in the output for each non-second-level domain indicating whether it's a wildcard match? |
So, it depends. What circumstances in trustymail make it reasonable to treat this differently from a deliberately set record? For DMARC, you're requiring that base domains apply policy to all subdomains. For other record types, you're requiring that email-sending hostnames do some work and have STARTTLS enabled, and presumably Also, when wildcard DNS is being used for legitimate purposes (such as
Just a note that we've never used that in our actual scans. That code was written for a one-time analysis of DNS log data from the .gov TLD, to try to get a better signal-to-noise ratio. I could see it potentially being broadly useful to have this information available during some kinds of scans. But it's tricky to avoid dropping legitimate services when wildcard DNS is in use. |
…ges_from_skeleton_generic Merge in upstream changes from skeleton-generic
https://yourefired.usajobs.gov is not a host that OPM should be held accountable for, and resolves only because of a wildcard DNS record.
trustymail
presumes that "no NXDOMAIN response" means there's an individual host there, but this is too simplistic.TODOs:
The text was updated successfully, but these errors were encountered: