You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When setting dns_bind_port in /etc/containers/containers.conf to anything other than 53, containers in internal networks have no container-to-container name resolution (e.g. you can't ping database from a web container).
Inside containers /etc/resolv.conf is configured properly to the IP of the aardvark-dns resolver, but cannot specify a non-default port: DNS requests try to go to port 53 and fail. The non-default port is however perfectly reachable (using e.g. dig or nslookup).
Expected behavior
The behavior should be the same as with the default DNS port.
In non-internal networks, the following iptables rules are added to remap the non-default DNS port as 53 (YMMV), but these are missing in internal networks:
Observed behavior
When setting
dns_bind_port
in/etc/containers/containers.conf
to anything other than 53, containers in internal networks have no container-to-container name resolution (e.g. you can'tping database
from aweb
container).Inside containers
/etc/resolv.conf
is configured properly to the IP of the aardvark-dns resolver, but cannot specify a non-default port: DNS requests try to go to port 53 and fail. The non-default port is however perfectly reachable (using e.g.dig
ornslookup
).Expected behavior
The behavior should be the same as with the default DNS port.
In non-internal networks, the following iptables rules are added to remap the non-default DNS port as 53 (YMMV), but these are missing in internal networks:
Versions on the host:
podman
: 5.1.2aardvark-dns
: 1.11.0ufw
firewall with default deny for incoming and forwarded packetsNote: See discussion on the mailing list for more details.
The text was updated successfully, but these errors were encountered: