Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150322172300.GA21110@openwall.com>
Date: Sun, 22 Mar 2015 20:23:00 +0300
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE for Kali Linux

On Sun, Mar 22, 2015 at 12:54:57PM -0400, David A. Wheeler wrote:
> On 2015-02-26 I reported to Cygwin that they had a similar man-in-the-middle issue.
> The Cygwin package manager (which downloaded all other packages) was unprotected
> and downloaded using http (as http://cygwin.com/setup-x86.exe or http://cygwin.com/setup-x86_64.exe).
> They changed it to load with HTTPS, and later added HTTP Strict Transport Security (HSTS).

IMO, http vs. https is a red herring.  We shouldn't be focusing on
security of software downloads, but rather on authenticity of the
software.  If the distribution web server gets compromised, https
doesn't help.  Thus, GPG signatures and the like.

I find it ridiculous if we primarily complain that some site serves
downloads over http, and I find it ridiculous if we say they fixed "the
problem" when they move to https.

> Should I have requested a CVE?

I don't care about CVEs much, but if CVEs start being assigned to
anything like this, they should be for lack of signatures or lack of
signature verification in the vendor's recommended software installation
or update mechanism or lack of a way to verify the signing key or lack
of key verification in the vendor's recommended procedures (where
applicable).  (With key verification, it gets tricky.  So probably those
issues are not CVE-worthy yet, except in extreme cases where e.g. new
signing keys would be downloaded automatically with no verification.)

They should not be for use of http, nor for https vulnerabilities.

https does offer a security aspect that signatures don't: it hides from
some observers which exact software is being downloaded (and maybe that
it's a software download at all).  It doesn't do that perfectly because
the target address and transfer timings and sizes may be revealing, but
I do acknowledge there's some subtle improvement over http here.  I just
think this is far less important than ensuring authenticity of the
software.  So let's demand signatures and signature verification first,
and let's not be distracted by http vs. https.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.