Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-11-19 Thread Moritz Muehlenhoff
On Mon, Jul 28, 2008 at 12:50:42PM -0400, Robert Edmonds wrote: from my testing (by repeatedly calling dns.resolver.query), dnspython opens a new socket for each query. on my kernel (2.6.25) the source port numbers appear to be random, but maybe this is a kernel feature introduced

Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-29 Thread Bob Halley
On 28 Jul 2008, at 09:50, Robert Edmonds wrote: [ i am CC'ing the upstream author, Bob Halley. Bob, are you planning a fix to bring dnspython in line with forgery-resilience? ] I haven't been rushing to make a fix because dnspython is a stub resolver (typically cacheless) and is thus

Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-28 Thread Thijs Kinkhorst
severity 492465 important thanks Hi Robert, On Monday 28 July 2008 07:27, Robert Edmonds wrote: python-dnspython isn't a dns cache. it may be susceptible to forgery resilience issues though. the qid field is explicitly randomized (but with the standard library rng). Yes - as I understand

Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-28 Thread Robert Edmonds
[ i am CC'ing the upstream author, Bob Halley. Bob, are you planning a fix to bring dnspython in line with forgery-resilience? ] Thijs Kinkhorst wrote: severity 492465 important thanks Hi Robert, On Monday 28 July 2008 07:27, Robert Edmonds wrote: python-dnspython isn't a dns cache.

Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-27 Thread Robert Edmonds
Thijs Kinkhorst wrote: Package: python-dnspython Version: 1.3.5-3.1 1.6.0-1 Severity: grave Tags: security Hi, From inspecting the code of dnspython, it seems that it is not using the recommended source port randomisation for countering the cache poisoning attack as discovered by Dan

Bug#492465: python-dnspython: appears to be vulnerable to cache poisoning attack CVE-2008-1447

2008-07-26 Thread Thijs Kinkhorst
Package: python-dnspython Version: 1.3.5-3.1 1.6.0-1 Severity: grave Tags: security Hi, From inspecting the code of dnspython, it seems that it is not using the recommended source port randomisation for countering the cache poisoning attack as discovered by Dan Kaminski and referenced as