-
Notifications
You must be signed in to change notification settings - Fork 35
Risk of trusting subdomains
nodiscc edited this page Apr 26, 2015
·
1 revision
Note: This does not apply if you untick Allow requests to the same domain
in Preferences > Manage policies > Default Policy
- Subdomains are generally assumed to be owned by the same organization as the main domain. (eg.
images.example.com
is assumed to belong to the same organization aswww.example.com
). The general risk is that it is possible for a site to direct traffic for a subdomain of theirs to a different company's IP address. This situation appears to be fairly uncommon at the current time, but is a real threat to privacy and is currently in use on various popular sites. The owner ofexample.com
could pointcdn.example.com
to a content distribution network used onexample.com
, but that is actually owned by an other company (content delivery netowrks, analytics and tracking services...), or to direct traffic forads.example.com
to an other company that serves ads. - If you host
personal.example.com
on your local network, an attacker who controlsanother.example.com
will be able to bypass RequestPolicy's default deny policy forpersonal.example.com
, as it does not apply to requests to the same domain. - An attacker that tricks you into visiting
www.evilsite.com
could point his subdomainattack.evilsite.com
to the IP address ofyour-bank.com
, thus the requests to the bank site will be allowed. However, your browser will not send cookies saved foryour-bank.com
to the attacker, as they do not have the same domain name. This makes the attack less useful in most situations.
- Home
- About
- Help & Support
-
Documentation
- Quick Start
- FAQ
- benefits of using RP
- miscellaneous
- Contributing
- Development