Dave Townsend wrote:
> Gervase Markham wrote:
>> Dave Townsend wrote:
>>> What I want is to be able to be able to establish some trust that the 
>>> update file retrieved is correct, and has not been tampered with, 
>>> intercepted and is as it was originally written by the add-on author.
>>
>> Link Fingerprints was designed for precisely this purpose, and is 
>> currently being implemented in Firefox by Ed Lee, who is sitting next 
>> to Dan Veditz:
>> http://www.gerv.net/security/link-fingerprints/
> 
> No this is really a different case to where link fingerprints are 
> useful. The update manifest file cannot be hashed before hand, i.e. in 
> version 1 of my extension I don't know the hash of the update manifest 
> in advance for when 2 is released.

Indeed not. I wasn't suggesting downloading the manifest using Link 
Fingerprints, but the final download. I was under the impression that 
all manifests were hosted on a.m.o.

> Yes for retrieving the final xpi a hash specified in the update manifest 
> is useful, and already implemented. 

OK, no problem then :-)

And were there a possibility to host
>  third party update manifests on addons.mozilla.org then this could work 
> without any extra effort. 

What do you mean by "third party manifests"? All the software on a.m.o. 
is third party.

> Currently that is not in place, however I will 
> be speaking to them to find out what possibilities exist along those 
> lines.

This seems like the right solution to me. In fact, I had assumed it was 
already the case, and that we were trying to solve the other half of the 
problem.

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to