I reviewed libndp version 1.4-2 as checked into vivid. This shouldn't be
considered a full security audit but rather a quick gauge of code
maintainability.

- libndp provides routines to work with ipv6 neighbor discovery
- Build-Depends: debhelper
- Does not itself daemonize
- Does listen on external interfaces
- Does not itself run as a system user, though real use probably will
- No pre/post inst/rm
- No initscripts
- No dbus services
- No setuid
- /usr/bin/ndptool provides a live monitor of ND packets
- No sudo fragments
- No udev rules
- No cron job
- No test suite
- Clean build logs

- No subprocesses spawned
- Careful memory management
- No files opened
- Logging looked safe
- Environment variable NDP_LOG used to determine log level, looked safe
- No privileged operations
- No cryptography
- Extensive networking
- No privileged portions of code
- No temporary files
- Does not use WebKit
- Does not use PolicyKit
- Clean cppcheck

This code is relatively spartan; there was less sanity-checking of the
packet contents than I expected, but error-checking on function calls
looks correct. The code looks direct and to the point and while this is
somewhat involved networking code, it looked well-programmed.

It's a real pity there's no tests; maintenance on this might be
complicated by the relative rarity of full IPv6 deployments and a test
suite would go a long way toward providing some assurance that fixes
are applied correctly.

Security team ACK for promoting libndp to main.

Thanks


** Changed in: libndp (Ubuntu)
     Assignee: Seth Arnold (seth-arnold) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1392385

Title:
  [MIR] libndp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libndp/+bug/1392385/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to