Open appliedprivacy opened 5 years ago
I believe that error is fixed by the commit https://github.com/NLnetLabs/unbound/commit/edf1ad369aea0134fe7856ad3bc4bcf48d814fc3 . It should then not happen anymore. This particular log message should then not happen, exept other bugs. Are there other log messages that need to be redacted, or do you think that, even though the bug is resolved, it is important to also remove potential internal-bug message contents for privacy reasons?
This particular log message should then not happen, exept other bugs. Are there other log messages that need to be redacted, or do you think that, even though the bug is resolved, it is important to also remove potential internal-bug message contents for privacy reasons?
Thanks for fixing the specific bug causing the log entries.
More generally speaking, we believe it should be up to the operators to decide whether they want to have any sensitive data in their logs at all, so it would still be great to either have something like a safelogging
option or just safe logs by default in verbosity: 0
mode.
Thank you!
We run public DNS resolvers that aim to protect the user's privacy by offering transport layer encryption and not having any query name logging, but when using unbound we are faced with logs that contain more data than we want according to our privacy policy even though we are running with verbosity: 0
and we currently do not see any way to avoid this via an unbound configuration option.
We would suggest to add an option that allows privacy focused DNS resolver operators to use unbound without having that kind of data in their logs.
It could be something like:
safelogging: 1
which would result in safer logs where sensitive data like: