Recaptcha IP addresses

纵然是瞬间 提交于 2019-12-06 03:20:51

Recatpcha from Google can use any Google IP address and there are lots of them.

Ran this from Windows:

_netblocks.google.com text = nslookup -type=TXT _netblocks.google.com "v=spf1 ip4:216.239.32.0/19 ip4:64.233.160.0/19 ip4:66.249.80.0/20 ip4:72.14.192.0/18 ip4:209.85.128.0/17 ip4:66.102.0.0/20 ip4:74.125.0.0/16 ip4:64.18.0.0/20 ip4:207.126.144.0/20 ip4:173.194.0.0/16 ?all"

That's all the network Google uses currently. These can change so check them often.

Google suggest allowing port 80 to all IPs outbound, this highly insecure. They recommend going through a proxy server but again that is highly insecure if your web server is an DMZ. Proxy aware trojans do exist. All that need to be done is exploit a vulnerability to execute arbitrary code and you can create reverse connection on port 80 through a proxy server to download the payload. Then it is trivial to escalate privileges and own the box. I don't mean just Windows servers but Linux as well. I've done it in lab environment on security was on. It's really easy to do.

This is the Google website I got this from:

http://code.google.com/p/recaptcha/wiki/FirewallsAndRecaptcha

Paul Schock

I wanted to append to this answer with more recent information. The documentation that Chris is pointing to does not include all of the TXT records necessary to dig (thanks Google):

  • _netblocks2.google.com (IPv6 subnets)
  • _netblocks3.google.com (Additional IPv4 subnets)

In my particular case, the _netblocks3 entry contained 2 large /19's that made my initial rule ineffective

(I found additional references here: https://support.google.com/a/answer/60764?hl=en)

Perhaps you should be using a hostname rather than IP

标签
易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!