Louis Munro
2016-02-17 16:46:40 UTC
Hello,
Buffer overflows are in the news again as I am sure people have heard by now.
The post on the google security blog about it seems to indicate that dnsmasq may be used to mitigate the problem, at least until patching could be done.
See: https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
I have some production servers running both dnsmasq (2.48) and the affected glibc.
Do I understand correctly that running dnsmasq in its default configuration should limit dns replies handled to 1280 bytes?
I see this in the manpage:
-P, --edns-packet-max=<size>
Specify the largest EDNS.0 UDP packet which is supported by the DNS forwarder. Defaults to 1280, which is
the RFC2671-recommended maximum for ethernet.
Since the vulnerability relies on a reply of at least 2048 bytes, can I assume I am fine until I can update these systems and reboot them (which should be soon, but just not yetâŠ)?
Does that setting also apply to TCP replies?
Best regards,
--
Louis Munro
***@inverse.ca :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org)
Buffer overflows are in the news again as I am sure people have heard by now.
The post on the google security blog about it seems to indicate that dnsmasq may be used to mitigate the problem, at least until patching could be done.
See: https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
I have some production servers running both dnsmasq (2.48) and the affected glibc.
Do I understand correctly that running dnsmasq in its default configuration should limit dns replies handled to 1280 bytes?
I see this in the manpage:
-P, --edns-packet-max=<size>
Specify the largest EDNS.0 UDP packet which is supported by the DNS forwarder. Defaults to 1280, which is
the RFC2671-recommended maximum for ethernet.
Since the vulnerability relies on a reply of at least 2048 bytes, can I assume I am fine until I can update these systems and reboot them (which should be soon, but just not yetâŠ)?
Does that setting also apply to TCP replies?
Best regards,
--
Louis Munro
***@inverse.ca :: www.inverse.ca
+1.514.447.4918 x125 :: +1 (866) 353-6153 x125
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org)