Branko Čibej wrote on Sat, Nov 22, 2014 at 08:38:29 +0100:
> There is a possible attack vector through that: Since Subversion was
> told to trust the stored certificate, one can imagine a situation where
> an attacker (a) subverts IP routing and/or DNS to redirect your
> connections to their own server, with a different certificate; (b)
> breaks in to your, and (c) every other, client machine to change their
> stored server certs. However, at least (c) unlikely.
> 
> OTOH, since "unlikely" is not the same as "can't happen", we should
> perhaps consider not storing the server cert, too, if plaintext password
> storage is disabled.
> 

Whether or not you store the cert simply doesn't matter if your attacker
controls the contents of ~/.subversion/auth/.  The way to deal with a
poisoned cache is to nuke it or disregard it.

For example, 'rm -rf ~/.subversion' or '--config-dir=$(mktemp -d)'.

Daniel

> P.S.: Compare the above scenario with the far more simple and likely one
> where the attacker breaks into your server and steals it wholesale,
> including the server's private key.

Reply via email to