Replies: 2 comments 3 replies
-
This is the pasta/resolv.conf setup for the rootless netns: The reason podman adds additional servers is simply as backup in case the first resolver fails.
That is certainly possible. |
Beta Was this translation helpful? Give feedback.
-
I don't understand your argument. Podman literally checks that and extracts configs specific to systemd-resolved and NetworkManager. To be clear, I'm not proposing a special treatment for systemd-resolved, quite opposite - I want to remove it. Except when it's necessary for mirroring the docker behavior if that's considered a goal for podman. And speaking of docker, I've never seen unencrypted requests from a docker container with a custom network configured.
There were a lot of security bugs when unprivileged user namespaces exposed huge attack surface in the kernel. Despite that, you are working on podman whose one of the main selling points is rootless mode. Hypothetical bugs should not stop the progress. Also as I said in the other thread, this approach endangers people in the authoritarian countries. I know what you mean, but it is a little bit ironic to call that the safe side.
Thank you. It seems to work. That doesn't remove public nameservers from
Should I create a new issue and link it to containers/common#2492, or will it be enough to highlight the systemd-resolved and NetworkManager specifics in a comment? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello, @Luap99.
I'm researching #248 and noticed that there are 3 nameservers in the upstream list:
This list of nameservers matches
/run/user/936/containers/networks/rootless-netns/resolv.conf
.I believe inclusion of public nameservers causes dns requests leak if systemd-resolved response was slower than 5/3=1.66 seconds.
Do you happen to know who generate this file in the podman stack?
Beta Was this translation helpful? Give feedback.
All reactions