El 22/10/24 a las 00:05, Bob Halley escribió:
> This is a blast from the past; 2008 is a LONG time ago!

Indeed! :-)

> It should be fine, as of 1.7 since the entropy pool added then would help 
> with query id randomness.   Newer dnspython releases use the system's 
> randomness source via python APIs instead of the dnspython entropy pool if 
> possible, so should be even better.  Also dnspython creates a new socket for 
> every query, so there will be port randomization from the OS most likely as 
> well.   Finally, dnspython doesn't cache by default, and even if its optional 
> caching features are enabled, the nature of the way it caches does not leave 
> it susceptible to the Kaminsky style attacks.  Also it is probably harder for 
> an attacker to send a giant stream of queries through dnspython than it is to 
> send them to an ISP in most things that use dnspython.

Thanks a lot for your answer.

Given the above, ff there are no objections, I would close this bug with
Version: 1.7.1-.

Dear security team, would you agree with changing this in the security
tracker?

diff --git a/data/CVE/list b/data/CVE/list
index cc75787c27..761c635a98 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -714267,7 +714267,7 @@ CVE-2008-1447 (The DNS protocol, as implemented in 
(1) BIND 8 and 9 before 9.5.0
        - refpolicy 2:0.0.20080702-1
        - pdnsd 1.2.6-par-11 (bug #502275)
        - python-dns 2.3.1-5 (low; bug #490217)
-       - dnspython <unfixed> (unimportant; bug #492465)
+       - dnspython 1.7.1-1 (unimportant; bug #492465)
        NOTE: Just a stub resolver Linux kernel provides source port 
randomisation
        - adns 1.4-2 (unimportant; bug #492698)
        NOTE: adns is not suitable to use with untrusted responses, documented 
in README.Debian

> /Bob
> 
> 
> > On Oct 21, 2024, at 12:33, Santiago Ruano Rincón <santiag...@riseup.net> 
> > wrote:
> > 
> > El 29/07/08 a las 17:28, Bob Halley escribió:
> >> 
> >> On 28 Jul 2008, at 09:50, Robert Edmonds wrote:
> >> 
> >>> [ i am CC'ing the upstream author, Bob Halley.  Bob, are you planning a
> >>> fix to bring dnspython in line with forgery-resilience? ]
> >> 
> >> I haven't been rushing to make a fix because dnspython is a stub resolver
> >> (typically cacheless) and is thus not likely a profitable target.
> >> 
> >> Having said that, I would like to strengthen it, but it will take a little
> >> time since I'd like to improve the quality of the randomness as well.
> >> Python's random() function is based on the Mersenne Twister, which is not
> >> cryptographically strong.  What's the timeframe for lenny?
> > 
> > Hello Bob,
> > 
> > While reviewing some bugs in Debian, I found this long-standing issue
> > about dnspython and CVE-2008-1447 ("the Kaminsky bug"):
> > https://bugs.debian.org/492465, and I wonder what is the current actual
> > status.
> > 
> > I see this as part of the changes introduced by 1.7.0 in 2009:
> > 
> >    An entropy module has been added and is used to randomize query ids.
> > 
> > Could it be considered then safe to state that #492465 is fixed? If yes,
> > would it be from 1.7.0 (actually 1.7.1-1 in Debian) version?
> > 
> > Best regards,
> > 
> > -- Santiago
> 
> 

Attachment: signature.asc
Description: PGP signature

Reply via email to