Dave Townsend wrote:
> What I want is to be able to be able to establish some trust that the 
> update file retrieved is correct, and has not been tampered with, 
> intercepted and is as it was originally written by the add-on author.

Link Fingerprints was designed for precisely this purpose, and is 
currently being implemented in Firefox by Ed Lee, who is sitting next to 
Dan Veditz:
http://www.gerv.net/security/link-fingerprints/

You get the URL from a trusted source (i.e. the updates.rdf downloaded 
from addons.mozilla.org over SSL) and then use the fingerprint to verify 
that the data you get is actually the correct data. You can download it 
over HTTP, from an "untrusted" site, because if you get the wrong data, 
the implementation throws it away and tells you so.

No changes would be required to the updates system (apart from update 
authors having to specify the fingerprint when they register a new 
update) and they can use any web host they like - cheap, free, whatever. 
It's much easier to manage than certificates and I believe, for this 
application, gives equivalent security.

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to