On 6/23/2007 2:31 PM, Nelson B wrote:
> Gerv,  Your web page http://www.gerv.net/security/link-fingerprints/
> doesn't provide any obvious channel for feedback or public discussion
> of that proposal, that I can see.  So, I'm using this channel.
> 
> The page makes certain claims that I don't believe.  Here's one.
> 
>> To substitute a trojan, the attacker would need to hack both the download
>> site and the website supplying the information - or the user's mailbox.
> 
> Unless the page that contains that link is an https page, to substitute a
> trojan, an attacker need only substitute his own URL for the original
> page's URL while the page is in transit.  A proxy server is a perfect
> place to perform such an MITM attack.  Http pages with login forms that
> submit their contents via https have the very same vulnerability.
> 

The page also proposes some implementation details that are troublesome.
 For example, a hash mismatch would cause the downloaded file to be
deleted.  Also a misformed hash would block downloading.  Both of these
create denial-of-service opportunities; all a hacker has to do is alter
the hash in the anchor (link) that would be used to initiate downloading.

Of course, the Web author could accidentally provide a bad hash.  Or the
Web author could forget that ASCII files might get modified during FTP
operations, invalidating the hash.  Such a forgetful author might also
forget to change the hash in the anchor when changing the file that the
link downloads.  Each of these situations results in the page's author
creating his or her own denial-of-service.

I much more favor providing both the target file and a separate file
containing the hash, as is done on the Mozilla FTP site.  I actually use
this situation to verify the integrity of the downloaded file with
Mozilla's MD5 hashes.  While MD5 is now known to be vulnerable to hacks
based on collisions, it's still valid for checking the integrity of a
file in the absence of hostile actions.

See bugs #101743 and #292481, both of which (especially the latter) seem
to be addressed in Gerv's Web page without being cited.

By the way, I really like your last sentence about "Http pages with
login forms".  I unsuccessfully tried to convince my bank of this.  See
my <http://www.rossde.com/editorials/CalOaksBank.html>.  The problem was
partially solved when they redesigned their login to split the user ID
and password onto two separate pages.  With the password now on an HTTPS
page, I feel more secure.

-- 

David E. Ross
<http://www.rossde.com/>.

Anyone who thinks government owns a monopoly on inefficient, obstructive
bureaucracy has obviously never worked for a large corporation. © 1997
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to