I'm looking into protecting against DNS rebinding attacks in-depth. Naturally, using HTTPS and making sure anything else validates the Host header does a good job at protecting from DNS rebinding attacks, but I really feel this is something that could be stopped at the door, so to speak.
For those who are not aware, a simple DNS rebinding attack is when a DNS server returns two records for a domain, one legit external IP and one internal IP (there are more advanced attacks). Using a couple of tricks you can get the browser to send internal HTTP requests and exfiltrate the responses.
I would have expected that filtering out internal IPs from external DNS responses should already be a default, or at least something that can be done. But I've googled extensively and can't find any info on configuring this with Windows DNS Server.
It seems other DNS servers, like BIND, handle this readily.
Is there anyway I can filter out or block external DNS responses that contain an internal IP address using Microsoft DNS?
(ps: I'm new here, if this isn't the appropriate stack site for this question please let me know).