Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 3 Jan 2009 19:46:59 +0100
From:      cpghost <cpghost@cordula.ws>
To:        RW <rwmaillists@googlemail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Foiling MITM attacks on source and ports trees
Message-ID:  <20090103184659.GB1253@phenom.cordula.ws>
In-Reply-To: <20090103013825.18910bf5@gumby.homeunix.com>
References:  <20090102164412.GA1258@phenom.cordula.ws> <495E4F24.80209@unsane.co.uk> <20090103013825.18910bf5@gumby.homeunix.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Jan 03, 2009 at 01:38:25AM +0000, RW wrote:
> On Fri, 02 Jan 2009 17:30:12 +0000
> Vincent Hoffman <vince@unsane.co.uk> wrote:
> > Admittedly this doesn't give a file by file checksum
> 
> That's not really a problem, it's no easier to create a collision
> in a .gz file than a patch file. 
> 
> The more substantial weakness is that the key is verified against a
> hash stored on the original installation media. If someone went to the
> trouble of diverting dns or routing to create a fake FreeBSD site they
> would presumably make it self-consistent down to the ISO checksums.

That's why I suggested that the list of checksums be digitally signed
by a private key belonging to The FreeBSD Project. It is assumed that
getting the corresponding public key would be possible by other means
not susceptible to MITM attacks (e.g. through endless replication all
over the net, fingerprint in books etc...).

-cpghost.

-- 
Cordula's Web. http://www.cordula.ws/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090103184659.GB1253>