On Thu, Oct 29, 2015 at 3:20 PM, Richard Hipp <[email protected]> wrote:

> On 10/29/15, Warren Young <[email protected]> wrote:
> >
> > I’ll bet there are a whole lot of people who would love to get some evil
> > code into pretty much every smartphone in the world by hacking the SQLite
> > code repo.
> >
> > That’s a powerful motivation.  Don’t underestimate it.
>
> That might be difficult.
>
> (1) More is involved that just breaking the SHA1 artifact hashes.
> Each check-in manifest also has a hash over all content of all files
> in the R card.  It's an MD5 hash, but that still means the attacker
> would have to find replacement source code that (a) matched both SHA1
> and MD5 hashes and (b) was valid C code.  Good luck with that.
>

Wait, so fossil is already doing what I suggested it could do (hashing the
entire commit). Why is the R card optional?

-- 
Scott Robison
_______________________________________________
fossil-users mailing list
[email protected]
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to