For anyone who's looking at DNS logs for security purposes, that "random, unqualified 32-character alphanumeric hostname" is going to cause significant issues for anyone trying to figure out what initiated that DNS request. It's also going to look suspiciously like a botnet's DGA. It would be better if these requests made it explicitly clear a) that it's intentionally invalid b) what triggered the request.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1088611 Title: using random hostnames to detect dns proxies allows for false positives To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1088611/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs