When setting dns_bind_port in /etc/containers/containers.conf to anything other than 53, containers in internal networks have no container-to-container name resolution (e.g. you can't ping database from a web container).
Inside containers /etc/resolv.conf is configured properly to the IP of the aardvark-dns resolver, but cannot specify a non-default port: DNS requests try to go to port 53 and fail. The non-default port is however perfectly reachable (using e.g. dig or nslookup).
Expected behavior
The behavior should be the same as with the default DNS port.
In non-internal networks, the following iptables rules are added to remap the non-default DNS port as 53 (YMMV), but these are missing in internal networks:
Observed behavior
When setting
dns_bind_port
in/etc/containers/containers.conf
to anything other than 53, containers in internal networks have no container-to-container name resolution (e.g. you can'tping database
from aweb
container).Inside containers
/etc/resolv.conf
is configured properly to the IP of the aardvark-dns resolver, but cannot specify a non-default port: DNS requests try to go to port 53 and fail. The non-default port is however perfectly reachable (using e.g.dig
ornslookup
).Expected behavior
The behavior should be the same as with the default DNS port.
In non-internal networks, the following iptables rules are added to remap the non-default DNS port as 53 (YMMV), but these are missing in internal networks:
Versions on the host:
podman
: 5.1.2aardvark-dns
: 1.11.0ufw
firewall with default deny for incoming and forwarded packetsNote: See discussion on the mailing list for more details.