oss-sec mailing list archives
Re: CVE for Kali Linux
From: Alexander Cherepanov <ch3root () openwall com>
Date: Mon, 23 Mar 2015 10:43:07 +0300
On 23.03.2015 02:48, Russ Allbery wrote:
Alexander Cherepanov <ch3root () openwall com> writes:There are some attacks even if you verify signatures, e.g. serving old, known-vulnerable versions. HTTPS can help here (until signatures start to be widely accompanied by expiring timestamps or something).Debian is indeed moving in exactly that direction, using the Valid-Until attribute of the archive metadata. This currently isn't (yet?) enabled for the main stable archive, but is for the unstable and testing archives, the security archive, and the backports archive.
Yes, and Release file for stable includes Date header, which is good enough for manual inspection. But cd images have only their SHA256SUMS signed, right? This means that file names are signed too so an attacker cannot substitute debian 7.7. for debian 7.8 but dates are harder to check.
-- Alexander Cherepanov
Current thread:
- Re: CVE for Kali Linux, (continued)
- Re: CVE for Kali Linux Daniel Micay (Mar 22)
- Re: CVE for Kali Linux Stephen Kitt (Mar 22)
- Re: CVE for Kali Linux Daniel Micay (Mar 22)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 22)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 22)
- Re: CVE for Kali Linux Russ Allbery (Mar 22)
- Re: CVE for Kali Linux Solar Designer (Mar 22)
- Re: CVE for Kali Linux Russ Allbery (Mar 22)
- Re: CVE for Kali Linux David A. Wheeler (Mar 22)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 23)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 23)
- Re: CVE for Kali Linux Marcus Meissner (Mar 23)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 23)
- Re: CVE for Kali Linux Marcus Meissner (Mar 23)
- Re: CVE for Kali Linux Marcus Meissner (Mar 24)
- Re: CVE for Kali Linux Alexander Cherepanov (Mar 24)
- Re: CVE for Kali Linux Kurt Seifried (Mar 22)
- Re: CVE for Kali Linux Solar Designer (Mar 22)
