oss-sec mailing list archives
Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning
From: Michael Samuel <mik () miknet net>
Date: Fri, 21 Feb 2014 10:59:40 +1100
On 21 February 2014 03:21, <cve-assign () mitre org> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1So, if original author says it's a flaw then it's a flaw, otherwise not?Otherwise MITRE attempts to use the best available information in deciding whether "security improvement" is a better categorization. Across all types of products and problems, the original author is generally allowed to admit that they made a mistake when writing the code in a certain way.
This is flawed reasoning. The question is: if there is a patch for software that addresses an attack, will users expect to get this pushed out to them via their distribution outside of the release cycle? In this case, the clear answer is yes.
So now SipHash is 'the only' way to avoid hash collision ever?
At present, introducing SipHash is a type of patch that's very likely to be considered when a software maintainer is responding to hash-collision problems. Certainly other patch approaches are possible. Not all code originated with an implicit functional specification that the code would do a good job at resisting all types of intentional hash-collision attacks. So, in general, when a description of a new attack is published, any resulting patches can be considered security improvements.
This is not true. When a new attack is published, patches are made for software that are vulnerable to the attack. This is what CVE numbers track. Also, this isn't a standard unbalanced hashtable CPU DoS flaw - this is causing fundamental changes in the software's behaviour based on hashtable collisions. Regards, Michael
Current thread:
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning, (continued)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 17)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 18)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 11)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning Florian Weimer (Feb 27)
- Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 19)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning cve-assign (Feb 20)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning P J P (Feb 20)
- Re: CVE Request New-djbdns: dnscache: potential cache poisoning cve-assign (Feb 20)
- Re: Re: CVE Request New-djbdns: dnscache: potential cache poisoning Michael Samuel (Feb 20)