On Thu, Aug 05, 2010 at 01:11:24PM -0600, Kevin Fenzi wrote:
> On Wed, 04 Aug 2010 22:03:14 +0200
> Till Maas <opensou...@till.name> wrote:

> > The attack is quite trivial:
> > 1) clone the git pkg Fedora repos
> > 2) commit some nasty change
> > 3) publish the repo on some server
> > 4) if the victim wants to fetch from the Fedora pkg repo, use the MITM
> > attack to make him fetch from the server set up in step 3. Steps 1-3
> > can obviously be done on-demand.
> > 
> > If this is e.g. done on a conference / FUDCon / Fedora Action Day, the
> > attack can easily targeted to make the change in step 2 be expected to
> > be fast forward. E.g. if packages simply need to be bumped for a
> > rebuild, a upload of a bad tarball and modification of the sources
> > file might be unnoticed.
> 
> Just to clarify, as this is a long thread: 
> 
> This only works if people are using git:// urls, not the default for
> fedora ssh: ones, right? (provided you have connected before to
> pkgs.fedoraproject.org and have the known_hosts entry?)

Yes ssh is secure if used properly. To get the proper known_hosts entry,
one has to download https://admin.fedoraproject.org/ssh_known_hosts btw.

Regards
Till

Attachment: pgpTOv2d3CtC1.pgp
Description: PGP signature

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to