Security flaw caused by RC sigs [was: Release policy question]
From: Christian Stork <cstork_at_ics.uci.edu>
Date: 2006-02-02 21:45:08 CET
On Thu, Feb 02, 2006 at 12:25:35PM -0600, kfogel@collab.net wrote:
> > - svn x.y.0rc1 was signed by all relevant people but not released due to
> > Evil Hacker can now reuse the x.y.0rc1 sigs to make Good Company believe
> > This would be a sort of replay attack, I guess.
> This is unrelated to our numbering strategy.
Sorry, I should have changed the subject earlier.
> If release X is blessed by sufficient signers, and then later
The sigs should clearly identify what they mean. Maybe you
> I don't understand exactly what Evil Hacker would do to make Good
Evil Hacker doesn't! She installs x.y.0-rc1 under the name x.y.0 and
Now you might say that Good Company should also check the publicly
Of course, the subversion project could take the position that it's good
1. RM sends out RCs
"subversion-x.y.z.tar.gz <MD5-digest-of-subversion-x.y.z.tar.gz>"
4. From that point on (ie as soon as there exists one relevant sig of
I hope that's clearer.
-- Chris Stork <> Support eff.org! <> http://www.ics.uci.edu/~cstork/ OpenPGP fingerprint: B08B 602C C806 C492 D069 021E 41F3 8C8D 50F9 CA2F --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@subversion.tigris.org For additional commands, e-mail: dev-help@subversion.tigris.orgReceived on Thu Feb 2 21:45:39 2006 |
This is an archived mail posted to the Subversion Dev mailing list.
This site is subject to the Apache Privacy Policy and the Apache Public Forum Archive Policy.