*** This bug is a security vulnerability ***

Public security bug reported:

ubuntu offers an overview to get hashes of download files at
https://help.ubuntu.com/community/UbuntuHashes (via HTTPS).

It then takes me to http://releases.ubuntu.com (via HTTP). Which then
takes me to e.g. http://releases.ubuntu.com/15.10/ (via HTTP). Which
then takes me to  e.g. http://releases.ubuntu.com/15.10/SHA256SUMS (via
HTTP) which finally contains the hashes.

This HTTP resource is not protected against MITM attackers. Basically
that means that when MITM is able to compromize the download, MITM
should also be able to compromize the hashes I want to test against.
There is also no HTTPS-secured representation of these hashes available
(e.g. http://releases.ubuntu.com/15.10/SHA256SUMS).

But there's a http://releases.ubuntu.com/15.10/SHA256SUMS.gpg signature
while it is not mentioned in the web pages above, how this can be used
to mitigate MITM attacks or who is finally authorized to sign something
in the name of ubuntu and which is his or her pgp public key.

I remember that there was once a HTTPS-secured web page containing all
the hashes for at least the ubuntu 14.04.x downloads. I think this was
really straight forward: Get the hash from a trusted source (via https)
and compare with the hash of the download. In that sense, I consider the
current state as a regression.

** Affects: add-apt-key (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1534967

Title:
  ubuntu distro hashes insecure against MITM attacks (when not using
  GPG)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/add-apt-key/+bug/1534967/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to