Am Wed, Oct 23, 2024 at 07:23:23PM -0300 schrieb Santiago Ruano Rincón:
> El 22/10/24 a las 00:05, Bob Halley escribió:
> > This is a blast from the past; 2008 is a LONG time ago!
> 
> Indeed! :-)
> 
> > It should be fine, as of 1.7 since the entropy pool added then would help 
> > with query id randomness.   Newer dnspython releases use the system's 
> > randomness source via python APIs instead of the dnspython entropy pool if 
> > possible, so should be even better.  Also dnspython creates a new socket 
> > for every query, so there will be port randomization from the OS most 
> > likely as well.   Finally, dnspython doesn't cache by default, and even if 
> > its optional caching features are enabled, the nature of the way it caches 
> > does not leave it susceptible to the Kaminsky style attacks.  Also it is 
> > probably harder for an attacker to send a giant stream of queries through 
> > dnspython than it is to send them to an ISP in most things that use 
> > dnspython.
> 
> Thanks a lot for your answer.
> 
> Given the above, ff there are no objections, I would close this bug with
> Version: 1.7.1-.
> 
> Dear security team, would you agree with changing this in the security
> tracker?

Looks good.

Cheers,
        Moritz

Reply via email to