看板FB_security
标 题Re: Recent security announcement and csup/cvsup?
发信站NCTU CS FreeBSD Server (Sun Nov 18 17:45:41 2012)
转信站ptt!csnews.cs.nctu!news.cs.nctu!.cs.nctucs.nctu!.org!ownorg!owner-free
I agree, but there is signature system, which with addition of =
appropriate SW (e.g. built in in ports fetch/update/ ...) provides the =
required security.
LPA
Dne 11/18/12 12:42 AM, pi=9Ae David Thiel:
> On Sat, Nov 17, 2012 at 10:05:33AM -0500, Gary Palmer wrote:
>> Can someone explain why the cvsup/csup infrastructure is considered inse=
cure
>> if the person had access to the *package* building cluster? Is it becau=
se
>> the leaked key also had access to something in the chain that goes to cv=
sup,
>> or is it because the project is not auditing the cvsup system and so the
>> default assumption is that it cannot be trusted to not be compromised?
> Regardless of the circumstances of the incident, use of cvsup/csup has
> always been horrendously dangerous. People should regard any code
> retrieved over this channel to have been potentially compromised by a
> network attacker.
>
> Portsnap. Srsly.
>
> -David
> _______________________________________________
> [email protected] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "[email protected]=
g"
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"