[dns-operations] Sad news today: systemd-resolved to be deployed in Ubuntu 16.10
    Peter van Dijk 
    peter.van.dijk at powerdns.com
       
    Mon Jun  6 15:51:55 UTC 2016
    
    
  
Hello Paul,
On 5 Jun 2016, at 20:29, Paul Wouters wrote:
> On Fri, 3 Jun 2016, Phil Regnauld wrote:
>
> systemd-resolved requires a forwarder. It is not a full DNS recursive
> server. So source port randomization is pretty useless as you are most
> likely just doing DNS on the local network.
As others said, many machines are pointed at 8.8.8.8, providing a clear 
‘outside’ path for attackers to sit on (or ‘off’). Source port 
randomisation is very useful in this case because systemd-resolved also 
caches, and thus is much more prone to poisoning than a simple stub like 
the one in libc is.
As for the NAT argument I read somewhere in the thread, yes, NAT often 
demolishes your randomised ports. But machines behind NAT are not the 
primary audience for a spoofing attack (and besides, “some networks 
will derandomise your ports” is not a real argument against 
randomisation). Machines out on the Internet, that you can convince to 
do queries for you (like by talking to their SMTP for a bit) are the 
audience, and those will benefit hugely from port randomisation between 
systems-resolved and their upstream resolver (which often is 8.8.8.8 
these days, even for servers!).
Kind regards,
-- 
Peter van Dijk
PowerDNS.COM BV - https://www.powerdns.com/
    
    
More information about the dns-operations
mailing list