File: SECURITY

package info (click to toggle)
dietlibc 0.34~cvs20160606-10
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 11,336 kB
  • sloc: ansic: 71,631; asm: 13,006; cpp: 1,860; makefile: 799; sh: 292; perl: 62
file content (13 lines) | stat: -rw-r--r-- 633 bytes parent folder | download | duplicates (11)
1
2
3
4
5
6
7
8
9
10
11
12
13
The diet libc was written with small code and embedded devices in mind,
not with security for network servers.

Of course we still try to avoid buffer overflows, but there are some
parts of the code where tradeoffs have been made.  This file is meant to
document them.

  1. The DNS routines do not check whether the answer came from the IP
     of the DNS server.  The rationale is that people who can sniff the
     network to find out the query, source port and DNS sequence number
     can also spoof DNS packets to appear to come from the server we
     asked, so it does not actually increase security to have that
     check.