Hello,

On Sat, 2008-07-12 at 23:13 +0000, Joe Smith wrote:
> Andrei Popescu <andreimpopescu <at> gmail.com> writes:
> 
> > How about distributing the Release files *only* from a trusted server?

> The other attack I mentioned (the attack of attempting to exploit a flaw in 
> any
> client that requests a security update) cannot be fixed in the general case,
> except by clients using a trusted server, or a trusted proxy that does not
> reveal the true requesting system's IP.
> Stable is safe because the security servers are trusted. Users of testing or 
> sid
> should choose servers they trust or some form of trusted proxy. 

Stable is safe... as long as there's no man-in-the middle attack (e.g
like a public wireless access-point with a transparent http proxy, if
it's used over a long period of time).

If we also consider the fact that the computer local time might be wrong
(hwclock bug + a ntp man-in-the-middle...), re-signing the files doesn't
help either [in this very specific case].

One costly solution would be to get the client the send a challenge to a
trusted server, which would respond by gpg-signed the challenge + the
checksum of current .Release file.

Franklin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to