[Pidgin] #11110: Pidgin appears to leak DNS for Jabber accounts
Pidgin
trac at pidgin.im
Fri Jan 8 20:38:53 EST 2010
#11110: Pidgin appears to leak DNS for Jabber accounts
-------------------------------------+--------------------------------------
Reporter: ioerror | Owner: deryni
Type: defect | Status: pending
Milestone: | Component: XMPP
Version: 2.6.4 | Resolution:
Keywords: jabber security privacy |
-------------------------------------+--------------------------------------
Changes (by ioerror):
* status: pending => new
Comment:
It appears that the leak is in libpurble/protocols/jabber.c
Suspect calls appear to be on line 683:
»···»···»···try_srv_connect(js);
And also on 686-687:
»···»···»···js->srv_query_data = purple_txt_resolve("_xmppconnect",
»···»···»···»···»···js->user->domain, txt_resolved_cb, js);
It appears that try_srv_connect() will eventually fall back to the
defaults:
»···/* Fall back to the defaults (I'm not sure if we should actually do
this) */
»···jabber_login_connect(js, js->user->domain, js->user->domain,
»···»···»···purple_account_get_int(purple_connection_get_account(js->gc),
"port", 5222),
»···»···»···TRUE);
I think if there's a proxy configured for a jabber account, it might make
sense to simply do this in the first place. It seems unlikely that any
SOCKS proxies will support SRV or TXT records in the near future. It might
make sense to allow a user to fill in those responses manually if they
know them (and they're not often changing)...
It may be prudent to check for a proxy in jabber_stream_connect() and to
alert the user that this isn't a possible working combination.
--
Ticket URL: <http://developer.pidgin.im/ticket/11110#comment:4>
Pidgin <http://pidgin.im>
Pidgin
More information about the Tracker
mailing list