Re: Integrity protection of fetches

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 04, 2010 at 09:42:01AM -0700, Adam Williamson wrote:

> I suspect it might short-circuit the 'ahhh, but what about...' 'oooh,
> but then I can...' nature of the conversation if you just put together a
> proof-of-concept attack and document it somewhere. I suspect the git
> maintainers might be interested at that point as well. :)

The attack is quite trivial:
1) clone the git pkg Fedora repos
2) commit some nasty change
3) publish the repo on some server
4) if the victim wants to fetch from the Fedora pkg repo, use the MITM
attack to make him fetch from the server set up in step 3. Steps 1-3 can
obviously be done on-demand.

If this is e.g. done on a conference / FUDCon / Fedora Action Day, the
attack can easily targeted to make the change in step 2 be expected to
be fast forward. E.g. if packages simply need to be bumped for a
rebuild, a upload of a bad tarball and modification of the sources file
might be unnoticed.

Regards
Till

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux