Am 25.03.13 17:34, schrieb Antoine Pitrou:
> 
>>> We have new contributors (who don't have a pre-existing key) use RSA:
>>> http://docs.python.org/devguide/faq.html#id1 .
>>
>> I was trying to avoid a man-in-the-middle attack by verifying the
>> server's key fingerprint. Those server fingerprints should be documented.
> 
> Well if a MITM attacker tries to use your ssh access to do anything nasty,
> another developer will probably notice quite quickly.
> (the only "nasty thing" the ssh access allows you to do is "hg push",
> IIRC; still, that can trigger code execution on the buildbots)

I thought the same first, but for the sufficiently-paranoid there
actually is a threat in spoofing hg.python.org:
- if you are not talking to the right server, hg pull might bring
  a trojan horse on your system, which you might then run into
  when trying to build Python.

OTOH, there is actually *no* threat at all for men-in-the-*middle*.
Anybody spoofing hg.python.org could not simultaneously connect
successfully to the actual hg.python.org, since they don't have
any authorized key, and since they cannot trick the actual client
in providing the proper token that the server would verify, see e.g.

http://utcc.utoronto.ca/~cks/space/blog/tech/SshAndMitM

Regards,
Martin

_______________________________________________
python-committers mailing list
python-committers@python.org
http://mail.python.org/mailman/listinfo/python-committers

Reply via email to