Date: Thu, 10 Apr 2014 16:40:15 GMT From: David Noel <david.i.noel@gmail.com> To: freebsd-gnats-submit@FreeBSD.org Subject: misc/188434: Freeze attacks against freebsd-update Message-ID: <201404101640.s3AGeFx0037509@cgiserv.freebsd.org> Resent-Message-ID: <201404101650.s3AGo025047891@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 188434 >Category: misc >Synopsis: Freeze attacks against freebsd-update >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Apr 10 16:50:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: David Noel >Release: 9.2 >Organization: >Environment: >Description: freebsd-update is vulnerable to freeze attacks. >How-To-Repeat: >Fix: Solution summary: the server-side inclusion of date-stamps, and strict client-side enforcement of expiration policies would mitigate this attack vector. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201404101640.s3AGeFx0037509>