Control: forwarded -1 https://github.com/DNSCrypt/dnscrypt-proxy/issues/1861
Thanks for the report. I've marked it forwarded upstream, and the fix appears to be in https://github.com/DNSCrypt/dnscrypt-proxy/commit/0f00cd27f92cee434336c6d6cde9df26286d8dbe. Do you think this is serious enough to warrant cherrypicking into the package or should we just wait for the next upstream release? * Danny van Heumen (da...@dannyvanheumen.nl) wrote: > Package: dnscrypt-proxy > Version: 2.0.45+ds1-1+b5 > Severity: normal > X-Debbugs-Cc: da...@dannyvanheumen.nl > > Dear Maintainer, > > A bug was recently found where DNS stamp information is used > incorrectly to fill the resolver cache on initialization. > > In short, DNS stamps of the various DNSCrypt/DoH/etc. resolvers include > hostname and port information for finding the server. Additionally, it > (optionally) includes an IPv4/IPv6 address to find the server without > nameserver resolution for bootstrapping/initialization purposes, in such > cases where it is unreliable or unavailable. > > dnscrypt-proxy intends to use this address in all cases - caching the > address with unlimited lifetime, but accidentally stored it with incorrect > key "hostname with optional port number". Subsequently loading from a key > "hostname" will fail to load the address from the cache. > > Consequently, in all cases of DoH servers that include a port number, > the bootstrapping address could not be loaded and dnscrypt-proxy needs to > rely on the system resolver to look up the address anyways. > > The details can be found in > https://github.com/DNSCrypt/dnscrypt-proxy/issues/1861 > and a side-effect was under discussion at > https://github.com/DNSCrypt/dnscrypt-proxy/discussions/1828 > > It is beneficial to use the DNS stamp information both for speed and > reliability of resolution. > > Kind regards, > Danny > > > PS: I am not familiar with bug reporting or bug handling in Debian. Please > let me know if I should do things differently. I may be able to help if > you want to cherry-pick the bugfix from upstream. (Although I am not > affiliated with the project in any way.) > > > -- System Information: > Debian Release: 11.0 > APT prefers stable-security > APT policy: (500, 'stable-security'), (500, 'stable') > Architecture: amd64 (x86_64) > > Kernel: Linux 5.10.0-8-amd64 (SMP w/4 CPU threads) > Kernel taint flags: TAINT_USER > Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), > LANGUAGE=en_US:en > Shell: /bin/sh linked to /usr/bin/dash > Init: systemd (via /run/systemd/system) > LSM: AppArmor: enabled > > Versions of packages dnscrypt-proxy depends on: > ii adduser 3.118 > ii libc6 2.31-13 > ii lsb-base 11.1.0 > > dnscrypt-proxy recommends no packages. > > Versions of packages dnscrypt-proxy suggests: > pn resolvconf <none> > > -- Configuration Files: > /etc/dnscrypt-proxy/dnscrypt-proxy.toml changed [not included] > > -- no debconf information -- Eric Dorland <e...@kuroneko.ca> 43CF 1228 F726 FD5B 474C E962 C256 FBD5 0022 1E93
signature.asc
Description: PGP signature