For anyone who's looking at DNS logs for security purposes, that
"random, unqualified 32-character alphanumeric hostname" is going to
cause significant issues for anyone trying to figure out what initiated
that DNS request. It's also going to look suspiciously like a botnet's
DGA. It would be better if these requests made it explicitly clear a)
that it's intentionally invalid b) what triggered the request.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1088611

Title:
  using random hostnames to detect dns proxies allows for false
  positives

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1088611/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to