Gervase Markham wrote:
> Nelson B wrote:
>> Unless the page that contains that link is an https page, to substitute a
>> trojan, an attacker need only substitute his own URL for the original
>> page's URL while the page is in transit.  A proxy server is a perfect
>> place to perform such an MITM attack.  Http pages with login forms that
>> submit their contents via https have the very same vulnerability.
> 
> You are correct.
> 
> Link Fingerprints is a way to validate a download from an untrusted 
> source, when you start with a reference from a trusted source. If the 
> orginal source is not trusted, then the system does not provide complete 
> protection.

One needs a trusted source AND a trusted channel to that source.

> It still provides some protection, because hacking the download box and 
> then doing an MITM on the downloader is harder than just hacking the 
> download box alone. Note that also, for the alarm not to be raised, you 
> would need to MITM _every_ downloader.

The attacker may only wish to MITM one downloader, or a certain set of
downloaders (e.g. the users of his web proxy).

> However, I will make it more clear in the spec that the original URL has 
> to be provided from a trusted source.

And through a trusted channel.

> Gerv


-- 
Nelson B
12345678901234567890123456789012345678901234567890123456789012345678901234567890
00000000011111111112222222222333333333344444444445555555555666666666677777777778

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to