David E. Ross wrote:

>  For example, a hash mismatch would cause the downloaded file to be
> deleted.  Also a misformed hash would block downloading.  Both of these
> create denial-of-service opportunities; all a hacker has to do is alter
> the hash in the anchor (link) that would be used to initiate downloading.

I don't see a big problem here. If an attacker can modify a site's 
download link (or the download itself), then it's already game over. 
They could just point the download link at a trojan, non-existant file, 
or a blob of random bits. I think you're really reaching for a problem 
here...

> Of course, the Web author could accidentally provide a bad hash.

Doctor, it hurts when I do this!

>  Such a forgetful author might also
> forget to change the hash in the anchor when changing the file that the
> link downloads.  Each of these situations results in the page's author
> creating his or her own denial-of-service.

That's a feature, not a bug. :-)

But it's also no different than a page author creating a 
"denial-of-service" by forgetting to change the filename when they 
release a new version and delete the old one, or various other ways of 
shooting yourself in the foot.

> I much more favor providing both the target file and a separate file
> containing the hash, as is done on the Mozilla FTP site.

And how do you verify the contents of the hash file? Another hash file? :)

Justin
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to