Default-dns method using host resolv.conf can leak internal names to VM

Bug #1738753 reported by Sergey Matov
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Juniper Openstack
Status tracked in Trunk
Trunk
In Progress
High
Sergey Matov
Ubuntu
Confirmed
Undecided
Unassigned

Bug Description

Hello.

If default-dns used as network dns method we are using /etc/resolv.conf file of corresponding host in order to fetch nameservers list as forwarders for requests. In several cases this might be a security issue if internal DNS of compute node configured to serve internal names resolution.

Steps to reproduce:
0. If there is any interlan DNS running inside management network of cluster/cloud find a domain name that is visible only via this network OR can be visible via external world but "nslookup <name>" and "nslookup <name> 8.8.8.8" shows different IP in response
1. Setup default-dns method for network
2. Boot VM
3. Run nslookup to server defined in step 0
4. Response will show internal address.

For public cloud providers it's might be not good to let users having this kind of information.

Tags: config
Sergey Matov (smatov)
information type: Proprietary → Public
Changed in juniperopenstack:
assignee: nobody → Sergey Matov (smatov)
Jeba Paulaiyan (jebap)
tags: added: config
Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Review update] master

Review in progress for https://review.opencontrail.org/38457
Submitter: Sergey Matov (<email address hidden>)

Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in ubuntu:
status: New → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.