Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-04 Thread Florian Weimer
* Petr Salinger: > If I understand it correctly, the security problem is > "it allows remote attackers to guess sensitive values such as IP > fragmentation IDs by observing a sequence of previously generated > values". > By default, the next_value is previous_value+1, i.e. unsecure at all. > It ca

Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-04 Thread Petr Salinger
If I understand it correctly, this means that the fix is present in kfreebsd-8, but not kfreebsd-7? Yes. Not having it enabled by default seems good enough to me. If I understand it correctly, the security problem is "it allows remote attackers to guess sensitive values such as IP fragmenta

Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-03 Thread Moritz Muehlenhoff
severity 559107 normal thanks On Thu, Dec 03, 2009 at 02:01:06PM +0100, Petr Salinger wrote: > severity 559107 important > -- > > >But the status of CVE-2008-114[678] is still open. Do they affect the > >KFreeBSD port? What's the position of the FreeBSD kernel developers on > >these issues? > >

Processed: Re: Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-03 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 559107 normal Bug #559107 [kfreebsd-7] weaknesses in BSD PRNG algorithms Severity set to 'normal' from 'important' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (a

Processed: Re: Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-03 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 559107 important Bug #559107 [kfreebsd-7] weaknesses in BSD PRNG algorithms Severity set to 'important' from 'grave' > -- Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (adm

Bug#559107: weaknesses in BSD PRNG algorithms

2009-12-03 Thread Petr Salinger
severity 559107 important -- But the status of CVE-2008-114[678] is still open. Do they affect the KFreeBSD port? What's the position of the FreeBSD kernel developers on these issues? I used as description this http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictab