"Brian May" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
Joe Smith wrote:
However, if the security updates come from trusted security mirrors rather than a general mirror, that attack would fail too. So with the exception of Sid or Testing users that do not use the testing-security system to receive security
updates, Debian really is not terribly vulnerable to this.
It would still be possible to mount this attack if the attacker can intercept packets on the way to the official trusted security mirror and redirect them (e.g. transparent proxy) to an older copy of the mirror.


Well that is true. It is however, more difficult to pull off than the get-an-offical-mirror-and-run-a-replay-attack described in the article.

Anybody could do what is described in the article with little difficulty. It is far more difficult to set-up packet interception.

Use of https on the security mirror should virtually elimate the Man-in-the-middle risk.

I think that would make stable imune to security replay attacks.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to