[Dnsmasq-discuss] Enable bogus-priv by default
Simon Kelley
simon at thekelleys.org.uk
Tue Oct 20 21:35:45 BST 2015
To add to the list of canonical uses for dnsmasq: DHCP and DNS services
to VMs and containers in things like OpenStack. These typically use
RFC1918 addresses (there's no point in being able to spin a new VM in
seconds if you have to go buy it a real IPv4 address on the black market
first.....) so that's another argument against.
I think that the "principle of least surprise" would stop me from
_changing_ the default, even if I was convinced that the current choice
is the wrong one. It's much too late to change.
Actually, this isn't something that the code author needs to decide:
Vanishingly few people install dnsmasq from source. It's a choice for
the packager. That doesn't get me off the hook, since I package dnsmasq
for Debian (and therefore Ubuntu, too). I note, for instance that
--local-service
defaults OFF in the dnsmasq code, but is defaulted ON in new Debian
installations until explicitly turned off. The same could apply to
bogus-priv.
Of course that means the Kevin has far more people who he needs to
convince to act........
Cheers,
Simon.
On 20/10/15 01:21, Eric Luehrsen wrote:
> Kevin,
>
> I don't think there is a flaw in your logic. You are probably 50% right.
> DNSMASQ is so flexible and useful it has found two significant homes and
> a bunch of other neat uses.
>
> Top however, (1) as a single point entry router caching DNS
> (ex 192.168.1.1 / X.X.X.X -> 8.8.4.4), and (2) as a local machine
> name cache daemon (ex 127.0.1.1 / 192.168.1.2 -> 192.168.1.1).
> For use (1) your default concept is quite right to avoid harassing the
> world net and not enumerate your internal system to the world. For (2)
> rather, the workstation will need to forward otherwise useless requests
> up to the router to resolve local. So thats going to be your 50% split.
>
> So I would recommend that both options be included in the CONF syntax.
> I would then recommend that the default behavior be a conditional
> compile for the distribution builder. In a Debian-Linux workstation
> distr. the default is to forward. In a OpenWRT distr. the default is
> to not forward bogus local ... something like that.
>
> Eric
>
>> Hi Simon & list,
>>
>> Ok, here's the controversial idea. Can we consider enabling
>> 'bogus-priv' by default and have an additional option say 'allow-priv'
>> to now disable?
>>
>> My feeling is that not forwarding 'link-local' type requests upstream by
>> default is a cleaner way of having things configured. Bearing in mind
>> the popularity of dnsmasq in all sorts of devices (Internet of Things) a
>> 'be kind to your upstream servers and don't ask daft questions' default
>> should at least be considered.
>>
>> I'm sure the flaws in my idea, logic and thinking will now be loudly
>> explained :-)
>>
>> Kind regards,
>>
>> Kevin
>>
>>
>> _______________________________________________
>> Dnsmasq-discuss mailing list
>> Dnsmasq-discuss at lists.thekelleys.org.uk
>> http://lists.thekelleys.org.uk/mailman/listinfo/dnsmasq-discuss
More information about the Dnsmasq-discuss
mailing list