On Feb 9, 2016, at 11:45 PM, sqwarqDev <sqwarq...@icloud.com> wrote:
> 
> 
>> On 10 Feb 2016, at 09:08, Charles Srstka <cocoa...@charlessoft.com> wrote:
>> 
>> If your app is accessing your appcast via HTTP, that could be intercepted 
>> just the same as your relnotes, and then the attacker could set the relnotes 
>> URL to whatever s/he wants.
> 
> 
> Can I just double-check my understanding here:
> 
> 1. If the SUFeedURL uses https, the app is not vulnerable.

Not quite, because of 2.2 below.

Also, in theory somebody could: a) compromise your server to serve a malicious 
appcast or b) get a Certificate Authority to issue them a certificate in error 
(e.g. via social hack), thus undermining HTTPS security.  These are less likely 
and fairly catastrophic, so may be deemed to eclipse the vulnerability in 
Sparkle.


> 2. If 1 is true, neither of these matter:
>       2.1 the version of Sparkle
>       2.2 whether the release notes are http or https

If the release notes are via a separate URL and that URL is HTTP rather than 
HTTPS, then the attacker can spoof it as easily as they could spoof an HTTP 
appcast.  If they do that, then your app is just as vulnerable.

You are mostly safe if the appcast URL is HTTPS _and_ the release notes are 
embedded in the appcast or accessed via HTTPS URL.

Regards,
Ken


_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to