Nelson B wrote:
> Unless the page that contains that link is an https page, to substitute a
> trojan, an attacker need only substitute his own URL for the original
> page's URL while the page is in transit.  A proxy server is a perfect
> place to perform such an MITM attack.  Http pages with login forms that
> submit their contents via https have the very same vulnerability.

You are correct.

Link Fingerprints is a way to validate a download from an untrusted 
source, when you start with a reference from a trusted source. If the 
orginal source is not trusted, then the system does not provide complete 
protection.

It still provides some protection, because hacking the download box and 
then doing an MITM on the downloader is harder than just hacking the 
download box alone. Note that also, for the alarm not to be raised, you 
would need to MITM _every_ downloader.

However, I will make it more clear in the spec that the original URL has 
to be provided from a trusted source.

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to