Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On 07/03/2014 02:26 PM, Bernhard R. Link wrote: > * Hans-Christoph Steiner [140703 18:10]: >> You are correct that HTTPS would not entirely address #2, but it does >> improve the situation over HTTP. For example, an ISP, network operator, >> or government could block an entire mirror or all mir

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On 07/03/2014 03:08 PM, Michael Stone wrote: > On Thu, Jul 03, 2014 at 12:46:45PM -0400, Hans-Christoph Steiner wrote: >> Google uses SPKI pinning heavily, for example, >> but they still use CA-signed certificates so their HTTPS works with Firefox, >> IE, Opera, etc. > > Yes, and MS does similar

Re: Debian mirrors and MITM

2014-07-03 Thread Michael Stone
On Thu, Jul 03, 2014 at 12:46:45PM -0400, Hans-Christoph Steiner wrote: Google uses SPKI pinning heavily, for example, but they still use CA-signed certificates so their HTTPS works with Firefox, IE, Opera, etc. Yes, and MS does similar. The difference is, they own their infrastructure and deb

Re: Debian mirrors and MITM

2014-07-03 Thread Bernhard R. Link
* Hans-Christoph Steiner [140703 18:10]: > You are correct that HTTPS would not entirely address #2, but it does > improve the situation over HTTP. For example, an ISP, network operator, > or government could block an entire mirror or all mirrors by redirecting > requests to their own mirror whic

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On 07/03/2014 12:58 PM, Reid Sutherland wrote: > > On Jul 3, 2014, at 12:46 PM, Hans-Christoph Steiner wrote: >> >> SSH uses entirely unsigned keys, and it has proven a lot more reliable than >> HTTPS/TLS. You use HTTPS/TLS keys the same way as SSH, but TLS requires >> signed keys, self-signed

Re: Debian mirrors and MITM

2014-07-03 Thread Reid Sutherland
On Jul 3, 2014, at 12:46 PM, Hans-Christoph Steiner wrote: > > SSH uses entirely unsigned keys, and it has proven a lot more reliable than > HTTPS/TLS. You use HTTPS/TLS keys the same way as SSH, but TLS requires > signed keys, self-signed works. The signatures are only worth the trust path >

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On 07/03/2014 12:38 PM, Reid Sutherland wrote: > On Jul 3, 2014, at 12:25 PM, Hans-Christoph Steiner wrote: >> As for how to manage making HTTPS by default, this does not require every >> mirror buying HTTPS certificates every year from Certificate Authorities. >> There are workable solutions

Re: Debian mirrors and MITM

2014-07-03 Thread Reid Sutherland
On Jul 3, 2014, at 12:25 PM, Hans-Christoph Steiner wrote: > As for how to manage making HTTPS by default, this does not require every > mirror buying HTTPS certificates every year from Certificate Authorities. > There are workable solutions based on self-signed certificates. > > In Android ap

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On Jul 3, 2014, at 12:10 PM, Hans-Christoph Steiner wrote: > > On Jul 3, 2014, at 11:52 AM, Michael Stone wrote: > >> On Thu, Jul 03, 2014 at 11:05:17AM -0400, Hans-Christoph Steiner wrote: >>> I definitely agree there are legitimate concerns that using HTTPS on apt >>> mirrors would help, and

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On Jul 3, 2014, at 11:52 AM, Michael Stone wrote: > On Thu, Jul 03, 2014 at 11:05:17AM -0400, Hans-Christoph Steiner wrote: >> I definitely agree there are legitimate concerns that using HTTPS on apt >> mirrors would help, and people who suggest otherwise are out of date on what >> the threats

Re: Debian mirrors and MITM

2014-07-03 Thread micah
Hans-Christoph Steiner writes: > I should add: apt-transport-tor is a great project to improve this situation > as well that is probably more secure than HTTPS, but at a cost of probably > much slower download speeds. Using an apt mirror with an onion address would > entirely supplant HTTPS.

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On Jul 3, 2014, at 11:55 AM, Reid Sutherland wrote: > On Jul 3, 2014, at 11:09 AM, Hans-Christoph Steiner wrote: > >> >> On Jun 2, 2014, at 9:29 AM, Jann Horn wrote: >> >>> On Fri, May 30, 2014 at 10:06:06AM -0400, micah anderson wrote: Now I don't want to call into question the esteemed

Re: Debian mirrors and MITM

2014-07-03 Thread Reid Sutherland
On Jul 3, 2014, at 11:09 AM, Hans-Christoph Steiner wrote: > > On Jun 2, 2014, at 9:29 AM, Jann Horn wrote: > >> On Fri, May 30, 2014 at 10:06:06AM -0400, micah anderson wrote: >>> Now I don't want to call into question the esteemed authors of said >>> program, and depending libraries, but I do

Re: Debian mirrors and MITM

2014-07-03 Thread Michael Stone
On Thu, Jul 03, 2014 at 11:05:17AM -0400, Hans-Christoph Steiner wrote: I definitely agree there are legitimate concerns that using HTTPS on apt mirrors would help, and people who suggest otherwise are out of date on what the threats are. I think the integrity of the package itself is not reas

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On Jul 3, 2014, at 11:05 AM, Hans-Christoph Steiner wrote: > > On May 30, 2014, at 10:06 AM, micah anderson wrote: > >> Kurt Roeckx writes: >> >>> On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: > On Fri, May 30, 201

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On Jun 2, 2014, at 9:29 AM, Jann Horn wrote: > On Fri, May 30, 2014 at 10:06:06AM -0400, micah anderson wrote: >> Now I don't want to call into question the esteemed authors of said >> program, and depending libraries, but I do think that providing https >> mirrors gives us two distinct advantage

Re: Debian mirrors and MITM

2014-07-03 Thread Hans-Christoph Steiner
On May 30, 2014, at 10:06 AM, micah anderson wrote: > Kurt Roeckx writes: > >> On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: >>> On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: > The public Debian mirrors

Re: Debian mirrors and MITM

2014-06-02 Thread Jann Horn
On Fri, May 30, 2014 at 10:06:06AM -0400, micah anderson wrote: > Now I don't want to call into question the esteemed authors of said > program, and depending libraries, but I do think that providing https > mirrors gives us two distinct advantages over plain http: > > . in the case that t

Re: Debian mirrors and MITM

2014-05-31 Thread Giuseppe Mazzotta
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 31-05-14 12:55, Patrick Schleizer wrote: > Joey Hess:> [...] there are situations where >> debootstrap is used without debian-archive-keyring being >> available, [...] > > Please elaborate, which situations are these? > > Let me answer this:

Re: Debian mirrors and MITM

2014-05-31 Thread Patrick Schleizer
Joey Hess:> [...] there are situations where > debootstrap is used without debian-archive-keyring being available, [...] Please elaborate, which situations are these? -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas..

Re: Debian mirrors and MITM

2014-05-31 Thread Patrick Schleizer
Peter Palfrader: > On Fri, 30 May 2014, Joey Hess wrote: > >> Alfie John wrote: >>> Taking a look at the Debian mirror list, I see none serving over HTTPS: >>> >>> https://www.debian.org/mirror/list >> >> https://mirrors.kernel.org/debian is the only one I know of. >> >> It would be good to have

Re: Debian mirrors and MITM

2014-05-31 Thread Peter Palfrader
On Fri, 30 May 2014, Joey Hess wrote: > Alfie John wrote: > > Taking a look at the Debian mirror list, I see none serving over HTTPS: > > > > https://www.debian.org/mirror/list > > https://mirrors.kernel.org/debian is the only one I know of. > > It would be good to have a few more, because th

Re: Debian mirrors and MITM

2014-05-30 Thread Paul Wise
On Fri, May 30, 2014 at 8:15 PM, Alfie John wrote: > Taking a look at the Debian mirror list, I see none serving over HTTPS: > > https://www.debian.org/mirror/list Then you aren't trying hard enough, several of them support https, these ones at least: https://mirrors.kernel.org/debian/ https:/

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 09:43:47PM +0200, Erwan David wrote: Note that at least debian.org DNS is segned by DNSSEC and DANE is used, which allows to check that the certificate used by a debian.org site is the real one. We're not at the point where that can be relied on in the real world. There

Re: Debian mirrors and MITM

2014-05-30 Thread Erwan David
Le 30/05/2014 22:02, Henrique de Moraes Holschuh a écrit : > On Fri, 30 May 2014, Erwan David wrote: >> Le 30/05/2014 21:30, Joey Hess a écrit : >>> Alfie John wrote: Taking a look at the Debian mirror list, I see none serving over HTTPS: https://www.debian.org/mirror/list >>> https://m

Re: Debian mirrors and MITM

2014-05-30 Thread Henrique de Moraes Holschuh
On Fri, 30 May 2014, Erwan David wrote: > Le 30/05/2014 21:30, Joey Hess a écrit : > > Alfie John wrote: > >> Taking a look at the Debian mirror list, I see none serving over HTTPS: > >> https://www.debian.org/mirror/list > > https://mirrors.kernel.org/debian is the only one I know of. > > > > It

Re: Debian mirrors and MITM

2014-05-30 Thread Erwan David
Le 30/05/2014 21:30, Joey Hess a écrit : > Alfie John wrote: >> Taking a look at the Debian mirror list, I see none serving over HTTPS: >> >> https://www.debian.org/mirror/list > https://mirrors.kernel.org/debian is the only one I know of. > > It would be good to have a few more, because there ar

Re: Debian mirrors and MITM

2014-05-30 Thread Joey Hess
Alfie John wrote: > Taking a look at the Debian mirror list, I see none serving over HTTPS: > > https://www.debian.org/mirror/list https://mirrors.kernel.org/debian is the only one I know of. It would be good to have a few more, because there are situations where debootstrap is used without de

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 10:35:58AM -0700, Jeremie Marguerie wrote: In the end, the PPA can do pretty much whatever it wants from your system and this is scary. This is a hard problem to protect against and the only protection I see is... only install PPAs you can trust. Yup; any pinning mechani

Re: Debian mirrors and MITM

2014-05-30 Thread Denis Nikolaenko
On 30.05.2014 21:35, Jeremie Marguerie wrote: To "protect" openssh-server you would need to prevent modification of its dependency. But the PPA could just install a program that overrides the openssh-server manually (without doing that from APT). In this case, unless you run debsums you wouldn'

Re: Debian mirrors and MITM

2014-05-30 Thread Jeremie Marguerie
On Fri, May 30, 2014 at 10:03 AM, Hans Spaans wrote: > What basically is missing for a running system is repository signing key > pinning for packages that would "prevent" that a third party repository > could upgrade components provided by the base OS. How many of us didn't > added debian-multime

Re: Debian mirrors and MITM

2014-05-30 Thread Hans Spaans
On vr, 2014-05-30 at 10:53 -0400, Michael Stone wrote: > On Sat, May 31, 2014 at 12:46:12AM +1000, Alfie John wrote: > >Sorry for asking questions. > > Don't apologize for asking questions, it's perfectly reasonable to do so > and you'll find that many people in debian are more than happy to answ

Re: Debian mirrors and MITM

2014-05-30 Thread Horatio Leragon
From: Daniel To: Alfie John ; debian-security@lists.debian.org Sent: Friday, May 30, 2014 10:16 PM Subject: Re: Debian mirrors and MITM > The thing is: When you download an .iso file, that .iso file also contains a > signing key used to verify each p

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Sat, May 31, 2014 at 12:46:12AM +1000, Alfie John wrote: Sorry for asking questions. Don't apologize for asking questions, it's perfectly reasonable to do so and you'll find that many people in debian are more than happy to answer questions. Just make sure that you put in enough effort you

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Sat, May 31, 2014, at 12:39 AM, Michael Stone wrote: > On Sat, May 31, 2014 at 12:32:59AM +1000, Alfie John wrote: > >I'm definitely wanting to engage in serious discussion. I'm an avid > >Debian user and am wanting to protect its users. This *is* the Debian > >security mailing list after all ri

Re: Debian mirrors and MITM

2014-05-30 Thread Reid Sutherland
On May 30, 2014, at 10:11 AM, Alfie John wrote: > >>. keeps an adversary who may be listening on the wire from >> looking at what you are installing. who cares what you are >> installing? well it turns out that is very interesting >> information. If you can see

Re: Debian mirrors and MITM

2014-05-30 Thread Jason Fergus
I have to laugh at this, my phone was going off constantly this morning, and I was thinking "I don't have this much email normally!" Looked over the discussion and thought, "didn't this discussion happen recently?" It was something I was randomly thinking about one day too, but really plain-tex

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Sat, May 31, 2014, at 12:11 AM, Michael Stone wrote: > On Fri, May 30, 2014 at 11:50:32PM +1000, Alfie John wrote: > >Several times (public and private) I tried to explain how the > >download of APT (the binary itself) on an initial Debian install > >could be compromised via MITM since it's over

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Sat, May 31, 2014 at 12:32:59AM +1000, Alfie John wrote: I'm definitely wanting to engage in serious discussion. I'm an avid Debian user and am wanting to protect its users. This *is* the Debian security mailing list after all right? All I was trying to do is ask questions as to why it is curr

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Sat, May 31, 2014 at 12:11:28AM +1000, Alfie John wrote: On Sat, May 31, 2014, at 12:06 AM, micah anderson wrote: . keeps an adversary who may be listening on the wire from looking at what you are installing. who cares what you are installing? well it turns out tha

Re: Debian mirrors and MITM

2014-05-30 Thread Daniel
On Fri, May 30, 2014 at 11:50:32PM +1000, Alfie John wrote: > Several times (public and private) I tried to explain how the download > of APT (the binary itself) on an initial Debian install could be > compromised via MITM since it's over plaintext. Then the verification of > packages could simply

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 11:50:32PM +1000, Alfie John wrote: Several times (public and private) I tried to explain how the download of APT (the binary itself) on an initial Debian install could be compromised via MITM since it's over plaintext. Then the verification of packages could simply be ski

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Sat, May 31, 2014, at 12:06 AM, micah anderson wrote: > >> > The cryptographic signatures that are validated automatically by > >> > apt. > >> > >> What's stopping the attacker from serving a compromised apt? > > > > apt will check that the new apt is properly signed. > > This entire secure arti

Re: Debian mirrors and MITM

2014-05-30 Thread Reid Sutherland
On May 30, 2014, at 9:50 AM, Alfie John wrote: >> >> The whole point here is that Debian is already verifying the content it >> is receiving from any given data source. This was done from the very >> beginning because anyone can mirror and distribute Debian software. So >> unless there is a fla

Re: Debian mirrors and MITM

2014-05-30 Thread micah anderson
Kurt Roeckx writes: > On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: >> On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: >> > On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: >> > >The public Debian mirrors seem like an obvious target for governments to >> > >MITM.

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:37 PM, Reid Sutherland wrote: > >> Oh, and those key fingerprints are on an https page for those who > >> actually trust the CA system. > > > > That was my next question. If the fingerprints are on a HTTPS served > > page, then yes that seems like a valid solution. > >

Re: Debian mirrors and MITM

2014-05-30 Thread Reid Sutherland
On May 30, 2014, at 9:30 AM, Alfie John wrote: > On Fri, May 30, 2014, at 11:27 PM, Michael Stone wrote: >> On Fri, May 30, 2014 at 09:24:47AM -0400, Michael Stone wrote: >>> That's why you verify the initial install media per the link I posted >>> earlier... >> >> Oh, and those key fingerprint

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:29 PM, Michael Stone wrote: > On Fri, May 30, 2014 at 11:25:58PM +1000, Alfie John wrote: > >Well yes, that's something. But serving Debian over HTTPS would prevent > >the need for this. > > No, it wouldn't--you'd just have a different set of problems. Given that > mir

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:27 PM, Michael Stone wrote: > On Fri, May 30, 2014 at 09:24:47AM -0400, Michael Stone wrote: > >That's why you verify the initial install media per the link I posted > >earlier... > > Oh, and those key fingerprints are on an https page for those who > actually trust the

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 11:25:58PM +1000, Alfie John wrote: Well yes, that's something. But serving Debian over HTTPS would prevent the need for this. No, it wouldn't--you'd just have a different set of problems. Given that mirrors are distributed, it would probably be much more likely that y

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 09:24:47AM -0400, Michael Stone wrote: That's why you verify the initial install media per the link I posted earlier... Oh, and those key fingerprints are on an https page for those who actually trust the CA system. -- To UNSUBSCRIBE, email to debian-security-requ...

Re: Debian mirrors and MITM

2014-05-30 Thread Estelmann, Christian
Yes, but I think this time it will not be better... Some (most?) mirrors are supporting https. If you want to use https just try which mirrors are supporting it. ftp.us.d.o will not work very good because of the DNS round robin. On 30. Mai 2014 15:16:29 MESZ, Alfie John wrote: >On Fri, May 30,

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:24 PM, Michael Stone wrote: > On Fri, May 30, 2014 at 11:13:31PM +1000, Alfie John wrote: > >As what I posted earlier, all you would need to do is to MITM the > >install of APT during an install. Who cares what the signatures look > >like since you've NOPed the checksumm

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 11:13:31PM +1000, Alfie John wrote: As what I posted earlier, all you would need to do is to MITM the install of APT during an install. Who cares what the signatures look like since you've NOPed the checksumming code! That's why you verify the initial install media per t

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:17 PM, Reid Sutherland wrote: > > As what I posted earlier, all you would need to do is to MITM the > > install of APT during an install. Who cares what the signatures look > > like since you've NOPed the checksumming code! > > So OpenSSL can be flawed and nobody bats a

Re: Debian mirrors and MITM

2014-05-30 Thread Reid Sutherland
On May 30, 2014, at 9:13 AM, Alfie John wrote: > On Fri, May 30, 2014, at 11:08 PM, Adam D. Barratt wrote: The cryptographic signatures that are validated automatically by apt. >>> >>> What's stopping the attacker from serving a compromised apt? >> >> How would you get the client's system

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:03 PM, Estelmann, Christian wrote: > In Oct 2013 a similar discussion startet > https://lists.debian.org/debian-security/2013/10/msg00027.html Thanks for the link, but that discussion went nowhere pretty fast. Alfie -- Alfie John alf...@fastmail.fm -- To UNSUB

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 11:08 PM, Adam D. Barratt wrote: > >> The cryptographic signatures that are validated automatically by apt. > > > > What's stopping the attacker from serving a compromised apt? > > How would you get the client's system to install it in the first place? > (More specifical

Re: Debian mirrors and MITM

2014-05-30 Thread Kurt Roeckx
On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: > On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: > > On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: > > >The public Debian mirrors seem like an obvious target for governments to > > >MITM. I know that the MD5s are als

Re: Debian mirrors and MITM

2014-05-30 Thread Adam D. Barratt
On 2014-05-30 13:43, Alfie John wrote: On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: >The public Debian mirrors seem like an obvious target for governments to >MITM. I know that the MD5s are also published, but unless you're >

Re: Debian mirrors and MITM

2014-05-30 Thread Estelmann, Christian
In Oct 2013 a similar discussion startet https://lists.debian.org/debian-security/2013/10/msg00027.html On 30. Mai 2014 14:15:01 MESZ, Alfie John wrote: >Hi guys, > >Taking a look at the Debian mirror list, I see none serving over HTTPS: > > https://www.debian.org/mirror/list > >The public Debia

Re: Debian mirrors and MITM

2014-05-30 Thread Chris
On 30/05/2014 8:52 PM, Michael Stone wrote: On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: What's stopping the attacker from serving a compromised apt? https://www.debian.org/CD/verify That will cover the installer, for the packages see: https://wiki.debian.org/SecureApt --

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 10:49 PM, Chris Boot wrote: > >> The cryptographic signatures that are validated automatically by apt. > > > > What's stopping the attacker from serving a compromised apt? > > Oh god not this again. > > How exactly does using HTTPS solve this particular problem, anyway?

Re: Debian mirrors and MITM

2014-05-30 Thread Chris Boot
On 30/05/14 13:43, Alfie John wrote: > On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: >> On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: >>> The public Debian mirrors seem like an obvious target for governments to >>> MITM. I know that the MD5s are also published, but unless yo

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 10:43 PM, Alfie John wrote: > > The cryptographic signatures that are validated automatically by apt. > > What's stopping the attacker from serving a compromised apt? Thinking about this more, If I wanted to target a Debian system via MITM, serving a compromised APT woul

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote: What's stopping the attacker from serving a compromised apt? https://www.debian.org/CD/verify -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.deb

Re: Debian mirrors and MITM

2014-05-30 Thread Alfie John
On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote: > On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: > >The public Debian mirrors seem like an obvious target for governments to > >MITM. I know that the MD5s are also published, but unless you're > >verifying them with third parties,

Re: Debian mirrors and MITM

2014-05-30 Thread Michael Stone
On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote: The public Debian mirrors seem like an obvious target for governments to MITM. I know that the MD5s are also published, but unless you're verifying them with third parties, what's stopping the MD5s being compromised too? The cryptograp