Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider implementing random case to increase message entropy (0x20 hack) #91

Closed
clue opened this issue Feb 5, 2018 · 2 comments
Closed

Comments

@clue
Copy link
Member

clue commented Feb 5, 2018

Implementing random case for outgoing DNS queries can help improve message entropy and significantly reduce the risk for DNS poisoning attacks for certain scenarios.

Links for the reference:

This is particularly relevant for UDP queries (the default) and may be less so for in-flight messages over connection oriented protocols (#19 and #80).

I'm not working on this at the moment, but figured it's worth posting this here anyway. In case anybody feels like picking this up, PRs would be much appreciated 👍

@kelunik
Copy link

kelunik commented Feb 5, 2018

Consider using a CSPRNG as a first counter-measure first, PR already exists in #65.

@clue
Copy link
Member Author

clue commented Jun 24, 2018

@kelunik I agree and have no use for this beyond the CSPRNG that has been implemented via #101, so I believe this has been answered and will close this for now 👍

@clue clue closed this as completed Jun 24, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants