[FUG-BR] Procedimento para atualizar PORT vulnerável

Ricardo Nabinger Sanchez rnsanchez em gmail.com
Quarta Setembro 26 13:45:13 BRT 2007


On Wed, 26 Sep 2007 11:57:32 -0300
"Celso Viana" <celso.vianna em gmail.com> wrote:

> Ou seja?

Pode ser vulnerável, visto que o "problema" é com o protocolo em si, e
não com a aplicação (cvsup ou csup):

Historically, most people have used CVSup to keep their ports tree up to
date, but CVSup has a number of limitations:

    * CVSup is insecure. The protocol uses no encryption or signing, and
any attacker who can intercept the connection can insert arbitrary data
into the tree you are updating.
    * CVSup isn't end-to-end. Related to the previous point, this means
that anyone who can compromise a CVSup mirror can feed arbitrary data to
the people who are using that mirror.
    * CVSup isn't designed for frequent small updates. While CVSup is
very good at distributing CVS trees, and is very efficient for updating
a tree which has been significantly changed (eg, by a month or more of
commits), it transmits a list of all the files in the tree, which makes
it quite inefficient if only a few files have changed.
    * CVSup uses a custom protocol. This can cause problems for people
behind firewalls -- outgoing connections on port 5999 need to be
permitted -- and it needs a heavyweight server (cvsupd). 

http://www.daemonology.net/portsnap/

-- 
Ricardo Nabinger Sanchez                   rnsanchez em gmail.com
Powered by FreeBSD

  "Left to themselves, things tend to go from bad to worse."


Mais detalhes sobre a lista de discussão freebsd