Can you elaborate on what an adversary might do with this connection?

The name itself will be leaked via DNS requests regardless of TLS use.
The name itself may be leaked via SNI headers in a hypothetical HTTPS 
connection.

I'm not yet familiar with the data actually transferred once connected,
but my wildest speculation suggests that it's going to consist of e.g. a
User-agent header from the client and the server's best guess of
geographical area for the connecting IP address. It's hard to see what
an adversary of even immense power could do with any information from
this service.

It's also hard to see what an adversary would do if modifying the data
in-flight -- force an inconvenient time display in the menu bar perhaps?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1617535

Title:
  geoip.ubuntu.com does not utilize HTTPS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-geoip/+bug/1617535/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to