W dniu nie, 29.10.2017 o godzinie 20∶39 +0000, użytkownik Robin H.
Johnson napisał:
> On Sun, Oct 29, 2017 at 08:07:56PM +0100, Michał Górny wrote:
> > File verification model
> > -----------------------
> > The verification model aims to provide full coverage against different
> > forms of attack. In particular, three different kinds of manipulation
> > are considered:
> 
> s/three/four/
> > 1. Alteration of the file content.
> > 
> > 2. Removal of a file.
> > 
> > 3. Addition of a new file.
> 
> Add:
> 4. Metadata replay attacks [C08].

This isn't covered by the file verification model but merely
by the timestamp field which is described in a separate section.

> 
> > In order to prevent against all three, the system requires that all
> > files in the repository are listed in Manifests and verified against
> > them.
> 
> s/three/four/.
> 
> > Timestamp field
> > ---------------
> 
> ...
> > A malicious third-party may use the principles of exclusion and replay 
> 
> Insert [C08] after 'replay'.

Done.

> 
> > Strictly speaking, this is already provided by the various
> > ``metadata/timestamp.*`` files provided already by Gentoo which are also
> > covered by the Manifest. However, including the value in the Manifest
> > itself has a little cost and provides the ability to perform
> > the verification stand-alone.
> 
> Implementation Note: with TIMESTAMP, some of the old timestamp files will be 
> obsolete; they
> will already need special handling in Manifest generation, because they are
> added VERY late in distribution. Sadly not all of them, because of legacy
> dependencies (they will get IGNORE entries instead, as they are populated much
> later than manifest generation).

Tried to word it somewhat without getting too detailed.

> 
> > References
> > ==========
> 
> Additions:
> 
> .. [#C08]     Cappos, J et al. (2008). "Attacks on Package Managers" 
>    
> (https://www2.cs.arizona.edu/stork/packagemanagersecurity/attacks-on-package-managers.html)
> 

-- 
Best regards,
Michał Górny


Reply via email to