On 10/29/15, Warren Young <[email protected]> wrote:
>
> I’ll bet there are a whole lot of people who would love to get some evil
> code into pretty much every smartphone in the world by hacking the SQLite
> code repo.
>
> That’s a powerful motivation.  Don’t underestimate it.

That might be difficult.

(1) More is involved that just breaking the SHA1 artifact hashes.
Each check-in manifest also has a hash over all content of all files
in the R card.  It's an MD5 hash, but that still means the attacker
would have to find replacement source code that (a) matched both SHA1
and MD5 hashes and (b) was valid C code.  Good luck with that.

(2) And even if an attacker were able to do this, it wouldn't likely
go undetected.  Remember that SQLite uses 100% branch testing.  Any
malicious code would also have to preserve all current functionality
and also preserve 100% branch coverage to escape detection.

(3) We also do 100% inspection of all code changes between each
release using "fossil diff --from release --to trunk --tk".  You don't
think we would see unauthorized code?

I think if the bad guys wanted to break into phones, they'd probably
go after the Linux kernel first, which has far less testing and is far
more loosey-goosey about configuration management and which uses Git -
also with SHA1 but without the extra MD5 R-card hash.

-- 
D. Richard Hipp
[email protected]
_______________________________________________
fossil-users mailing list
[email protected]
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to