Il giorno 05/feb/2013, alle ore 15:06, Holger Krekel <holger.kre...@gmail.com> 
ha scritto:

> In the end, however, none of this prevents MITM attacks between a downloader 
> and pypi.python.org.  Or between the uploader and pypi.python.org (using 
> basic auth over http often).  Signing methods like 
> https://wiki.archlinux.org/index.php/Pacman-key are key.  If a signature is 
> available (also at a download_url site), then we can exclude undetected 
> tampering.  And there might not be a need to break currently working package 
> releases. 

A signature is not enough; if you don't have a secure channel, signatures can 
be replayed. Eg: if you install through an unsecure channel and you just verify 
GPG signatures on the package, I can MITM you and serve you an older, 
vulnerable package version (with its correct signature), and then go exploit 
that vulnerability.
-- 
Giovanni Bajo   ::  ra...@develer.com
Develer S.r.l.  ::  http://www.develer.com

My Blog: http://giovanni.bajo.it





Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to