BIND 10 #2326: Allocation engine v6: release

BIND 10 Development do-not-reply at isc.org
Wed Dec 19 11:58:25 UTC 2012


#2326: Allocation engine v6: release
-------------------------------------+-------------------------------------
            Reporter:  tomek         |                        Owner:  tomek
                Type:  task          |                       Status:
            Priority:  medium        |  reviewing
           Component:  dhcp6         |                    Milestone:
            Keywords:                |  Sprint-DHCP-20130103
           Sensitive:  0             |                   Resolution:
         Sub-Project:  DHCP          |                 CVSS Scoring:
Estimated Difficulty:  0             |              Defect Severity:  N/A
         Total Hours:  0             |  Feature Depending on Ticket:
                                     |          Add Hours to Ticket:  0
                                     |                    Internal?:  0
-------------------------------------+-------------------------------------
Changes (by stephen):

 * owner:  stephen => tomek


Comment:

 Reviewed commit 72beaf8964363734d4f5e7b4b11ae7b8b4b5557c.

 I've pushed another change to dhcp6_messages.mes.

 Some comments:

 > Because the reason for this is unknown. Just wiping it out would
 potentially mask a problem.
 Fair enough

 >> Line 780: suggest that this be a DEBUG message - a malicious client
 could trigger a flood of warning messages by sending release messages for
 random addresses. (It is assumed that by default, WARNING messages are
 enabled and DEBUG messages disabled.)
 > I disagree. This is a (serious) violation of RFC and we should log it.
 Nobody would notice a log on DEBUG level. I've lowered message severity to
 INFO. Does it look acceptable?

 Given that we log so few conditions, it's probably not a major issue.  The
 general concern for all BIND 10 is that any message that can be generated
 by a packet received from a user can be used as a DoS vector.  Although
 messages can be disabled, disabling all warning messages could mask other
 warning conditions related to the server.  Logging such messages with
 DEBUG severity is one solution:the other is to use a different logger (see
 src/lib/log/README - and before you ask, ticket #2566 has been created to
 convert this to Doxygen format for inclusion into the developer's guide).

 I've posted a message to bind10-dev to see which of the two solutions (if
 either) has been used for the DNS.  I suggest reverting it back to a
 warning (so that it is easier to find again) and we'll revisit this once
 there has been some discussion of the post.

 > So what would the mysql backend do, if it has access to the database in
 read-only mode?
 Read-only access to a database is set up by only restricting the user
 under which the connection is made to SELECT privilege only.  As a result,
 a delete operation will fail, even if the WHERE clause is such that no
 rows are selected for deletion.

 All OK, please merge after changing the message back to a warning.

-- 
Ticket URL: <http://bind10.isc.org/ticket/2326#comment:8>
BIND 10 Development <http://bind10.isc.org>
BIND 10 Development


More information about the bind10-tickets mailing list