On Thu, May 19, 2022 at 02:24:15AM +0200, TheAssassin via curl-library wrote:
> On 18.05.22 22:57, Dan Fandrich via curl-library wrote:
> > This sounds like it would become a source of problems, since the same
> > application running on exactly the same OS would have different behaviour
> > depending on whether a user-specified file is available in a magic location 
> > or
> > not.
> 
> What do you mean by user-specified file? The search path would be a
> compile-time option, classic distro libs would not enable the option.
> What do you mean by magic location?

Anything other than the standard OS-specific bundle is going to look magic to
the user. For example, if the path were set to
/etc/motd:/etc/pki/tls/certs/ca-bundle.crt then a file created at
/etc/motd would magically (i.e. unexpectedly) cause TLS connections to
stop working. Yes, that's a contrived worst-case example, and if AppImage
points it to an internal sandboxed path and documents it appropriately it
shouldn't be a problem.

> > There are security implications in setting up such a path.
> 
> Could you please share your concerns? I have thought about this, too, but
> couldn't come up with any problems. Note that the search path would be used
> only by applications which come as an AppImage anyway. And the search within
> libcurl is no way worse than a search within the application itself.

The most straightforward example is if the path included a world-writable
location, then an attacker could place a bad certificate there and enable a
MITM attack. Since there currently is no search within libcurl, there is
currently no danger.

I'm probably more wary of this than I need to be, but if such a feature is
added the implications need to be thoroughly thought through.

Dan
-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.haxx.se/mail/etiquette.html

Reply via email to