On Wed, 5 Sep 2012 16:49:34 -0430
Andres Perera wrote:

> On Wed, Sep 5, 2012 at 4:06 PM, Kevin Chadwick <ma1l1i...@yahoo.co.uk> wrote:
> > On Wed, 5 Sep 2012 15:49:15 -0430
> > Andres Perera wrote:
> >
> >> doesn't in any way justify
> >> downloading sha256 from more than one mirror from the same connection,
> >> kevin
> >
> > It does if a lower tier has been compromised and I never said from the
> > same connection.
> 
> i don't think anybody is talking about such attacks. the subject has
> clearly been mitm the whole time, since it's by far the easier attack
> 

Surely that depends on the networks, if your using OpenBSD it's quite
likely the other end which is more likely mitm or compromised, which is
half my point for many reasons. I'll admit crap routers are almost
everywhere though.

The ops mail

"Is there any way to verify that distribution sets and packages that I
have downloaded have not been tampered with (e.g., by someone with
access to the mirror from which I downloaded them)?"


> >
> > You must be one of them body language reading fools ;-)
> >

That was a joke due to your patronising, Andres.

> 
> no, the number of mirrors is never a factor. you are just copping out
>

Of course it is, less likely these days but for non local mitm the
mirrors may be in different directions not crossing the attackers path.

 
> and if you rely on the vast amount of data to weed out attackers that
> wouldn't waste the bandwidth it takes to replicate an obsd mirror, you
> aren't considering applications that divert on layer 7. ftp-proxy is
> an example. make an http/ftp session to the real server and only
> intercept GETs you care about

Where did that come from, my mention of checksums being possibly
noticed when wrong as has occured in ports maliciously and
happens when the mirrors are out of sync for snapshots?

Reply via email to