Re: Integrity protection of fetches

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 04 Aug 2010 22:03:14 +0200
Till Maas <opensource@xxxxxxxxx> wrote:

> On Wed, Aug 04, 2010 at 09:42:01AM -0700, Adam Williamson wrote:
> 
> > I suspect it might short-circuit the 'ahhh, but what about...'
> > 'oooh, but then I can...' nature of the conversation if you just
> > put together a proof-of-concept attack and document it somewhere. I
> > suspect the git maintainers might be interested at that point as
> > well. :)
> 
> The attack is quite trivial:
> 1) clone the git pkg Fedora repos
> 2) commit some nasty change
> 3) publish the repo on some server
> 4) if the victim wants to fetch from the Fedora pkg repo, use the MITM
> attack to make him fetch from the server set up in step 3. Steps 1-3
> can obviously be done on-demand.
> 
> If this is e.g. done on a conference / FUDCon / Fedora Action Day, the
> attack can easily targeted to make the change in step 2 be expected to
> be fast forward. E.g. if packages simply need to be bumped for a
> rebuild, a upload of a bad tarball and modification of the sources
> file might be unnoticed.

Just to clarify, as this is a long thread: 

This only works if people are using git:// urls, not the default for
fedora ssh: ones, right? (provided you have connected before to
pkgs.fedoraproject.org and have the known_hosts entry?)

kevin

Attachment: signature.asc
Description: PGP signature

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux