[ CC'ing Ian. ]

Ian, are you planning a fix for this?

the relevant recommendations, btw, are available in an ietf draft rfc:

http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Thijs Kinkhorst wrote:
> Package: adns
> Version: 1.4-0.1
> Severity: important
> Tags: security
> 
> Hi,
> 
> From inspecting the code of ands, it seems that it is not using the
> recommended source port randomisation for countering the cache poisoning
> attack as discovered by Dan Kaminski and referenced as CVE-2008-1447.
> 
> Since this is a stub resolver the risk is lesser than for caching 
> nameservers, 
> but nonetheless this is an issue which we really should be fixing in lenny. 
> Can you please look into that? As it seems a fix for important bugs can still 
> be granted a freeze exception.
> 
> If a straghtforward fix is available for etch, it would be released by the 
> security team.
> 
> thanks,
> Thijs

-- 
Robert Edmonds
[EMAIL PROTECTED]

Attachment: signature.asc
Description: Digital signature

Reply via email to