* Tom Copeland ([EMAIL PROTECTED]) wrote:
> On Tue, 2007-01-16 at 23:05 -0500, Paul Duncan wrote:
> >  if I
> > wanted to install a trojan on thousands of peoples' machines, all I'd
> > need to do would be to build a malicious gem (see below), called
> > "rails-2.0" and upload it to my gem directory, then sit and wait.
> 
> Hm, but that gem wouldn't be deployed on the RubyForge gem index unless
> it was uploaded to the rails project on RubyForge... so only folks who
> deliberately downloaded the gem from your project area would get
> p0wnd...

That's a good start, but it doesn't address the situation where one of
the mirrors or RubyForge itself is compromised, and a malicious gem is
forcibly inserted into the rotation.

> Yours,
> 
> Tom

-- 
Paul Duncan <[EMAIL PROTECTED]>        OpenPGP Key ID: 0x82C29562
http://www.pablotron.org/               http://www.paulduncan.org/

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Rubygems-developers mailing list
Rubygems-developers@rubyforge.org
http://rubyforge.org/mailman/listinfo/rubygems-developers

Reply via email to