But if the proxy transparently wrapped the EXE with a rootkit installer 
that just copied the embedded installer to a temp directory and ran it, 
all the digital signatures would be fine.

-david

Alex Pankratov wrote:
> Digitally singing .exe files before publishing and not executing
> unsigned binaries on the client end would be one option.
> 
> Alex
> 
>> I don't see any way to protect against this aside from suggestions to
>> use DNSSEC or SSL (or only use otherwise secured or switched networks.)
>> In practice the attack might be complicated by the client. It's
>> entirely possible the victim's resolver will get the 2nd response and
>> cache that -- who knows.
>>
>>> But wow, I'm amazed this doesn't happen more.  It seems like this
>> would be the most obvious way to spread a virus.  Indeed, I could
>> imagine creating a proxy that auto-infects every executable file that
>> comes through it (just add a silent rootkit installer that runs before
>> the real installer).
> 
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to