Activity log for bug #1449001

Date Who What changed Old value New value Message
2015-04-27 12:20:11 Malcolm Scott bug added bug
2015-04-27 12:21:38 Malcolm Scott bug watch added http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658
2015-04-27 12:21:38 Malcolm Scott bug task added systemd
2015-04-27 12:38:46 Martin Pitt systemd (Ubuntu): status New Triaged
2015-04-27 12:38:48 Martin Pitt systemd (Ubuntu): importance Undecided Low
2015-04-27 23:44:23 Bug Watch Updater systemd: status Unknown Fix Released
2015-06-08 17:55:36 Aminda Suomalainen bug added subscriber Mikaela Suomalainen
2015-11-24 11:16:04 stinger bug added subscriber stinger
2016-10-10 21:52:46 Anders Kaseorg bug watch added https://github.com/systemd/systemd/issues/4175
2016-10-10 21:56:37 Anders Kaseorg bug added subscriber Anders Kaseorg
2016-12-07 10:04:58 Martin Pitt tags resolved
2017-06-20 18:01:48 Brian Murray tags resolved resolved rls-aa-incoming
2017-06-21 09:49:21 Dimitri John Ledkov nominated for series Ubuntu Artful
2017-06-21 09:49:21 Dimitri John Ledkov bug task added systemd (Ubuntu Artful)
2017-06-21 09:49:21 Dimitri John Ledkov nominated for series Ubuntu Yakkety
2017-06-21 09:49:21 Dimitri John Ledkov bug task added systemd (Ubuntu Yakkety)
2017-06-21 09:49:21 Dimitri John Ledkov nominated for series Ubuntu Xenial
2017-06-21 09:49:21 Dimitri John Ledkov bug task added systemd (Ubuntu Xenial)
2017-06-21 09:49:21 Dimitri John Ledkov nominated for series Ubuntu Zesty
2017-06-21 09:49:21 Dimitri John Ledkov bug task added systemd (Ubuntu Zesty)
2017-06-21 09:49:57 Dimitri John Ledkov systemd (Ubuntu Artful): assignee Dimitri John Ledkov (xnox)
2017-06-21 09:50:02 Dimitri John Ledkov systemd (Ubuntu Artful): milestone ubuntu-17.06
2017-06-21 15:47:38 Dimitri John Ledkov systemd (Ubuntu Artful): status Triaged Fix Committed
2017-06-21 23:35:28 Anders Kaseorg bug task added systemd (Debian)
2017-06-21 23:35:45 Anders Kaseorg systemd: importance Unknown Undecided
2017-06-21 23:35:45 Anders Kaseorg systemd: status Fix Released New
2017-06-21 23:35:45 Anders Kaseorg systemd: remote watch Debian Bug tracker #761658
2017-06-22 15:38:10 Dimitri John Ledkov tags resolved rls-aa-incoming resolved
2017-06-22 15:43:42 Bug Watch Updater systemd (Debian): status Unknown Fix Released
2017-07-02 18:19:36 Launchpad Janitor systemd (Ubuntu Artful): status Fix Committed Fix Released
2017-07-02 18:19:36 Launchpad Janitor cve linked 2017-9445
2017-07-04 08:57:31 Dimitri John Ledkov bug task deleted systemd (Ubuntu Xenial)
2017-07-12 08:17:55 Launchpad Janitor systemd (Ubuntu Yakkety): status New Confirmed
2017-07-12 08:17:55 Launchpad Janitor systemd (Ubuntu Zesty): status New Confirmed
2017-07-21 09:23:08 Dimitri John Ledkov bug task deleted systemd (Ubuntu Yakkety)
2017-08-05 09:47:29 Andre bug added subscriber Andre
2017-08-31 10:12:59 Dimitri John Ledkov systemd (Ubuntu Zesty): status Confirmed In Progress
2017-09-04 10:44:35 Dimitri John Ledkov description systemd-resolved will fall back to Google public DNS (8.8.8.8, etc.) in the absence of other configured DNS servers. systemd-resolved is not enabled by default in Ubuntu 15.04, but it is installed by default and will behave in this way if enabled by the user. $ cat /etc/systemd/resolved.conf (...) # Entries in this file show the compile time defaults. (...) #FallbackDNS=8.8.8.8 8.8.4.4 2001:4860:4860::8888 2001:4860:4860::8844 This raises privacy concerns since in the event of accidental misconfiguration DNS queries will be sent unencrypted across the internet, and potentially also security concerns given systemd-resolved does not perform DNSSEC validation and is not particularly well hardened against malicious responses e.g. from a MITM (http://www.openwall.com/lists/oss-security/2014/11/12/5). I believe that it would be better to fail safe if no DNS server is configured -- i.e. have DNS lookups fail; it's better that the user is aware of their misconfiguration, rather than silently sending their queries to Google. The user can intentionally opt to use Google public DNS if they wish. Steps to reproduce: 1. Remove existing DNS configuration (from /etc/network/interfaces, /etc/resolv.conf, /etc/resolvconf/resolv.conf.d/*) 2. Reboot, or otherwise clear relevant state 3. sudo service systemd-resolved start 4. Note that Google's servers are listed in /run/systemd/resolve/resolv.conf 5. If systemd-resolved is enabled in /etc/nsswitch.conf (it isn't by default), observe that DNS lookups probably still work, and queries are being sent to one of Google's servers Possible workaround/bugfix: ship a resolved.conf which clears the FallbackDNS parameter. This issue has been discussed in the Debian BTS (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658). My interpretation of the Debian package maintainer's position is that a user concerned with the privacy implications shouldn't let systemd get into a state where it uses the fallback DNS servers (quoting Marco d'Itri: "Short summary: have a resolv.conf file or use DHCP"). I would argue that it's safest not to have fallback DNS servers configured at all by default. [Impact] systemd-resolved will fall back to Google public DNS (8.8.8.8, etc.) in the absence of other configured DNS servers. systemd-resolved is not enabled by default in Ubuntu 15.04, but it is installed by default and will behave in this way if enabled by the user. $ cat /etc/systemd/resolved.conf (...) # Entries in this file show the compile time defaults. (...) #FallbackDNS=8.8.8.8 8.8.4.4 2001:4860:4860::8888 2001:4860:4860::8844 This raises privacy concerns since in the event of accidental misconfiguration DNS queries will be sent unencrypted across the internet, and potentially also security concerns given systemd-resolved does not perform DNSSEC validation and is not particularly well hardened against malicious responses e.g. from a MITM (http://www.openwall.com/lists/oss-security/2014/11/12/5). I believe that it would be better to fail safe if no DNS server is configured -- i.e. have DNS lookups fail; it's better that the user is aware of their misconfiguration, rather than silently sending their queries to Google. The user can intentionally opt to use Google public DNS if they wish. [Testcase] Steps to reproduce: 1. Remove existing DNS configuration (from /etc/network/interfaces, /etc/resolv.conf, /etc/resolvconf/resolv.conf.d/*) 2. Reboot, or otherwise clear relevant state 3. sudo service systemd-resolved start 4. Note that Google's servers are listed in /run/systemd/resolve/resolv.conf 5. If systemd-resolved is enabled in /etc/nsswitch.conf (it isn't by default), observe that DNS lookups probably still work, and queries are being sent to one of Google's servers Possible workaround/bugfix: ship a resolved.conf which clears the FallbackDNS parameter. [Solution] In ubuntu, we disable fallback DNS at build time, via build system configuration flags. This issue has been discussed in the Debian BTS (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658). My interpretation of the Debian package maintainer's position is that a user concerned with the privacy implications shouldn't let systemd get into a state where it uses the fallback DNS servers (quoting Marco d'Itri: "Short summary: have a resolv.conf file or use DHCP"). I would argue that it's safest not to have fallback DNS servers configured at all by default.
2017-09-04 10:48:22 Dimitri John Ledkov description [Impact] systemd-resolved will fall back to Google public DNS (8.8.8.8, etc.) in the absence of other configured DNS servers. systemd-resolved is not enabled by default in Ubuntu 15.04, but it is installed by default and will behave in this way if enabled by the user. $ cat /etc/systemd/resolved.conf (...) # Entries in this file show the compile time defaults. (...) #FallbackDNS=8.8.8.8 8.8.4.4 2001:4860:4860::8888 2001:4860:4860::8844 This raises privacy concerns since in the event of accidental misconfiguration DNS queries will be sent unencrypted across the internet, and potentially also security concerns given systemd-resolved does not perform DNSSEC validation and is not particularly well hardened against malicious responses e.g. from a MITM (http://www.openwall.com/lists/oss-security/2014/11/12/5). I believe that it would be better to fail safe if no DNS server is configured -- i.e. have DNS lookups fail; it's better that the user is aware of their misconfiguration, rather than silently sending their queries to Google. The user can intentionally opt to use Google public DNS if they wish. [Testcase] Steps to reproduce: 1. Remove existing DNS configuration (from /etc/network/interfaces, /etc/resolv.conf, /etc/resolvconf/resolv.conf.d/*) 2. Reboot, or otherwise clear relevant state 3. sudo service systemd-resolved start 4. Note that Google's servers are listed in /run/systemd/resolve/resolv.conf 5. If systemd-resolved is enabled in /etc/nsswitch.conf (it isn't by default), observe that DNS lookups probably still work, and queries are being sent to one of Google's servers Possible workaround/bugfix: ship a resolved.conf which clears the FallbackDNS parameter. [Solution] In ubuntu, we disable fallback DNS at build time, via build system configuration flags. This issue has been discussed in the Debian BTS (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658). My interpretation of the Debian package maintainer's position is that a user concerned with the privacy implications shouldn't let systemd get into a state where it uses the fallback DNS servers (quoting Marco d'Itri: "Short summary: have a resolv.conf file or use DHCP"). I would argue that it's safest not to have fallback DNS servers configured at all by default. [Impact] systemd-resolved will fall back to Google public DNS (8.8.8.8, etc.) in the absence of other configured DNS servers. systemd-resolved is not enabled by default in Ubuntu 15.04, but it is installed by default and will behave in this way if enabled by the user. $ cat /etc/systemd/resolved.conf (...) # Entries in this file show the compile time defaults. (...) #FallbackDNS=8.8.8.8 8.8.4.4 2001:4860:4860::8888 2001:4860:4860::8844 This raises privacy concerns since in the event of accidental misconfiguration DNS queries will be sent unencrypted across the internet, and potentially also security concerns given systemd-resolved does not perform DNSSEC validation and is not particularly well hardened against malicious responses e.g. from a MITM (http://www.openwall.com/lists/oss-security/2014/11/12/5). I believe that it would be better to fail safe if no DNS server is configured -- i.e. have DNS lookups fail; it's better that the user is aware of their misconfiguration, rather than silently sending their queries to Google. The user can intentionally opt to use Google public DNS if they wish. [Testcase] Steps to reproduce: 1. Remove existing DNS configuration (from /etc/network/interfaces, /etc/resolv.conf, /etc/resolvconf/resolv.conf.d/*) 2. Reboot, or otherwise clear relevant state 3. sudo service systemd-resolved start 4. Note that Google's servers are listed in /run/systemd/resolve/resolv.conf 5. If systemd-resolved is enabled in /etc/nsswitch.conf (it isn't by default), observe that DNS lookups probably still work, and queries are being sent to one of Google's servers Possible workaround/bugfix: ship a resolved.conf which clears the FallbackDNS parameter. [Solution] In ubuntu, we disable fallback DNS at build time, via build system configuration flags. This issue has been discussed in the Debian BTS (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658). My interpretation of the Debian package maintainer's position is that a user concerned with the privacy implications shouldn't let systemd get into a state where it uses the fallback DNS servers (quoting Marco d'Itri: "Short summary: have a resolv.conf file or use DHCP"). I would argue that it's safest not to have fallback DNS servers configured at all by default. [Regression Potential] Missconfigured networks, that do not have a DNS server would previously magically work due to having Google DNS preconfigured regardless. With this change, such network configurations will fail to work, and one will have to properly fix network config to point at the right/existing name server.
2017-09-07 18:04:21 Brian Murray systemd (Ubuntu Zesty): status In Progress Fix Committed
2017-09-07 18:04:23 Brian Murray bug added subscriber Ubuntu Stable Release Updates Team
2017-09-07 18:04:26 Brian Murray bug added subscriber SRU Verification
2017-09-07 18:04:32 Brian Murray tags resolved resolved verification-needed verification-needed-zesty
2017-09-15 04:47:10 Mathew Hodson systemd (Ubuntu Zesty): importance Undecided Low
2017-10-02 13:58:07 Dimitri John Ledkov tags resolved verification-needed verification-needed-zesty resolved verification-done verification-done-zesty
2017-10-05 17:31:08 Brian Murray tags resolved verification-done verification-done-zesty resolved verification-needed verification-needed-zesty
2017-10-09 22:04:18 Anders Kaseorg tags resolved verification-needed verification-needed-zesty resolved verification-done verification-done-zesty
2017-10-26 14:28:26 Launchpad Janitor systemd (Ubuntu Zesty): status Fix Committed Fix Released
2017-10-26 14:28:45 Ɓukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team
2020-05-22 19:01:22 Simon May bug added subscriber Simon May