-
-
Notifications
You must be signed in to change notification settings - Fork 385
Unencrypted query is sent when forward-tls-upstream: yes is used without tls-cert-bundle #676
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I have trouble reproducing this with unbound 1.5.1 (compiled on centos7). Can you give that try? |
I am trying this on Fedora 35, compiled with commit 11d077c on master branch. Using this config to check:
Then attempt to resolve over this channel it fails reliably
As soon as I uncomment system cert statement it starts resolving.
|
I got also the same results on RHEL8 and RHEL7. The latter I tried |
Steps required on
|
The same result happen, when I use:
|
Ah. I tried your config with unbound where it works (for me). It does fail with unbound-host. I'll take a look why unbound-host is different from unbound in this respect. |
…yes is used without tls-cert-bundle Model the behavior of unbound in unbound-host: always create a SSL context
…yes is used without tls-cert-bundle Model the behavior of unbound in unbound-host: always create a SSL context
Fixed in master |
Describe the bug
I were playing with unbound and DNS over TLS. I wanted to check it does something, so I have configured unbound to provide TLS service. Then I made configuration for unbound-host to specify remotes.
To reproduce
Steps to reproduce the behavior:
unbound-host -C local.conf unbound.net
It seems this sends query just over TCP, but without proper TLS encapsulation. Queried name is visible in wireshark dump.
Expected behavior
It should always encrypt the query. It it is requested to do so but it cannot, it should emit error or at least warning. Nothing is emitted this way.
System:
unbound -V
output:Additional information
It would be cool if I could build-in default value for tls-cert-bundle pointing to distribution specific trust anchor storage. I guess it would be great default value and would be useful not only for unbound, which has a common config path. But tools like unbound-host have no default path to put that in.
Would PR specifying default value for TLS bundle be acceptable?
The text was updated successfully, but these errors were encountered: