>From the discussion [1] leading to the changes in this bug report, there
are a couple of statements which aren't so robust:

1. "will greatly improve the reliability of DNS resolution on our desktop 
systems"
 > the reliability only increases if dnsmasq were vulnerable and an exploit was 
 > being exercised

2. "at the cost of a slightly higher DNS traffic to the upstream DNS servers"
 > I measure a O(1000%) increase of DNS traffic in general desktop use 
 > (browsing, email, IM), due to applications frequently re-evaluating DNS 
 > queries. What basis is "slightly" arrived at?

3.  "the ... resolver must maintain a separate cache per user, to prevent 
privacy issues, and to prevent local users from spying on source ports and 
trivially performing a birthday attack in order to poison the cache for other 
users"
 > by what mechanism is privacy compromised for non-root users?
 > how and where is the detriment in local users "spying on source ports" if 
 > dnsmasq has the Rainbow attack mitigation?
 > how is a Birthday attack plausible when the known weaknesses exposing this 
 > were closed in 2008 [2]?
 > presenting the ultimate solution as needing per-user caching is missing the 
 > point, when the underlying issues need addressing

As it stands, dnsmasq is not vulnerable to Rainbow attacks after port
randomisation was introduced, and there have been further hardening
measures taken since; these changes remain Ubuntu-specific because the
logic is incomplete.

[1] https://blueprints.launchpad.net/ubuntu/+spec/foundations-p-dns-resolving
[2] http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2008q3/002148.html

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/903854

Title:
  Change default dnsmasq flags to not include --strict-order and disable
  caching

Status in “network-manager” package in Ubuntu:
  Fix Released

Bug description:
  When using dnsmasq as a backend, Network Manager currently passes
  --strict-order.

  This is a good way to get a similar behaviour to that of the libc's
  resolver where the DNS servers are being queried sequentially with a
  2-3s timeout per server. However in the case where the first DNS
  server is down, this will delay all the DNS queries on the system.

  Instead, I recommend this parameter be dropped which will fallback to
  the default dnsmasq mode to send the initial request to all servers
  and then continue with the first one that replies. This will increase
  the load on the upstream DNS servers quite a bit (though not as much
  as using --all-servers) but will ensure a proper fallback when some
  servers are down or very slow.

  I think this added load is reasonable and shouldn't affect most DNS
  servers too much. For cases where it's a concern (heavily loaded
  corporate network for example), I'd suggest the user simply turns off
  the dnsmasq plugin in /etc/NetworkManager/NetworkManager.conf thereby
  reverting to the libc's behaviour of trying servers sequentially with
  a 3s timeout.

  
  As discussed in 
https://blueprints.launchpad.net/ubuntu/+spec/foundations-p-dns-resolving for 
security reason (possible local cache poisoning), we also want to turn off 
caching for the LTS and reconsider caching (ideally with per-user caches) for 
12.10.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/903854/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to