Am Wed, Oct 23, 2024 at 07:23:23PM -0300 schrieb Santiago Ruano Rincón:
> El 22/10/24 a las 00:05, Bob Halley escribió:
> > This is a blast from the past; 2008 is a LONG time ago!
>
> Indeed! :-)
>
> > It should be fine, as of 1.7 since the entropy pool added then would help
> > with query id randomness. Newer dnspython releases use the system's
> > randomness source via python APIs instead of the dnspython entropy pool if
> > possible, so should be even better. Also dnspython creates a new socket
> > for every query, so there will be port randomization from the OS most
> > likely as well. Finally, dnspython doesn't cache by default, and even if
> > its optional caching features are enabled, the nature of the way it caches
> > does not leave it susceptible to the Kaminsky style attacks. Also it is
> > probably harder for an attacker to send a giant stream of queries through
> > dnspython than it is to send them to an ISP in most things that use
> > dnspython.
>
> Thanks a lot for your answer.
>
> Given the above, ff there are no objections, I would close this bug with
> Version: 1.7.1-.
>
> Dear security team, would you agree with changing this in the security
> tracker?
Looks good.
Cheers,
Moritz
_______________________________________________
Python-modules-team mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/python-modules-team