[Bug 247409] Re: Python-dns does not randomize TID causing DNS poisoning risk
ubuntu at kitterman.com
Sat Jul 26 06:24:48 UTC 2008
That should do it....
Upstream reviewed a previous version of this patch (some of it comes
from their CVS repository, but they only did TID randomization, not
source port randomization). This version addresses their comment, but I
haven't heard back from them on it.
I tested this on Dapper (which has a kernel that does not randomize
ports) and captured DNS data using ethereal and observed that the source
port and TID changed in an apparently random fashion each time.
Python-dns does not randomize TID causing DNS poisoning risk
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to linux-source-2.6.15 in ubuntu.
More information about the kernel-bugs