BugTraq
Windows Server 2003 Security Guide available Apr 25 2003 04:35AM
Michael Howard (mikehow microsoft com) (1 replies)
RE: Windows Server 2003 Security Guide available Apr 25 2003 09:27PM
Jason Coombs (jasonc science org) (2 replies)
RE: Windows Server 2003 Security Guide available Apr 29 2003 03:07PM
David F. Skoll (dfs roaringpenguin com) (2 replies)
Re: Windows Server 2003 Security Guide available Apr 29 2003 07:45PM
Lucas Holt (luke foolishgames com)
RE: Windows Server 2003 Security Guide available Apr 29 2003 04:39PM
Uwe Betz (Uwe Betz honeynet de)
RE: Windows Server 2003 Security Guide available Apr 29 2003 05:52AM
Frank Knobbe (fknobbe knobbeits com) (1 replies)
On Fri, 2003-04-25 at 16:27, Jason Coombs wrote:
> [...]
> For every .exe that Microsoft distributes, it should consider publishing a
> known good full-file hash code so that a hash verification tool of the user's
> choice can be used, on a platform of the user's choice, to verify that the
> file received over the network is the file they expected -- BEFORE attempting
> to use a tool like Windows Explorer to read structured information such as
> digital signature data out of the PE file's header sections.
> [...]

Jason,

I'm not sure how much a file hash will do to alleviate your concern
about MITM attacks. If for example MS web site gets hijacked, or somehow
else someone is able to replace the downloadable files, what stops them
from generating a new SHA-1 or MD5 hash?

While hashes can verify the integrity of a file, it doesn't do anything
to verify the authenticity of a file. That can only be done through a
signature. Of course that requires you to actually trust such a
signature/signer and trust in the method of verifying these signatures.

It sounds like you find flaws in the signature verification of Explorer.
While I agree that is substandard (how many patches are unsigned, but
people install them anyway?), I do believe that only signatures can
correct the deficiency you outline.

In a perfect world, MS would make their white papers available in an
widely adopted standard like PDF or PS files, and sign them using
PGP/GPG. But since this is not a perfect world, and we have to accept
proprietary .doc files or OS dependent executables, why not use a sub
optimal verification process?

Regards,
Frank

[ reply ]
RE: Windows Server 2003 Security Guide available Apr 29 2003 07:49AM
Jason Coombs (jasonc science org)


 

Privacy Statement
Copyright 2010, SecurityFocus