-
Notifications
You must be signed in to change notification settings - Fork 18
[Documentation] Clarify DNS allowlisting implementation status #12
Copy link
Copy link
Closed
Labels
bugSomething isn't workingSomething isn't workingdocumentationImprovements or additions to documentationImprovements or additions to documentation
Description
Priority
Low
Description
The documentation (CLAUDE.md:226-253) extensively describes DNS server allowlisting as a defense against DNS exfiltration, but the actual implementation doesn't restrict DNS queries by destination IP.
Documentation claims
--dns-serversflag restricts DNS queries to trusted DNS server IPs only
Actual behavior
- CLI accepts
--dns-serversflag - Container-level:
setup-iptables.shallows DNS to any IP (port 53) - Host-level:
host-iptables.tsallows DNS to any IP (port 53) - DNS server IPs are not used in filtering rules
Actions needed
- Update documentation to reflect actual behavior (interim)
- Implement DNS IP restriction (see [Security] DNS queries allowed to any IP on port 53 (data exfiltration risk) #9) and then restore docs
- Add tests verifying DNS queries to non-allowlisted IPs are blocked
Code locations
CLAUDE.md:226-253- DNS defense documentationsrc/cli.ts- Parses--dns-serversbut doesn't use it for filteringcontainers/copilot/setup-iptables.sh:29-37- Generic DNS allow rulessrc/host-iptables.ts:181-192- Generic DNS allow rules
Related to
Issue #9 (DNS IP restriction implementation)
Reactions are currently unavailable
Metadata
Metadata
Labels
bugSomething isn't workingSomething isn't workingdocumentationImprovements or additions to documentationImprovements or additions to documentation
Type
Fields
Give feedbackNo fields configured for issues without a type.