[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #2340 [Tor bundles/installation]: GPG signatures do not authenticate filenames
#2340: GPG signatures do not authenticate filenames
--------------------------------------+-------------------------------------
Reporter: rransom | Owner: rransom
Type: defect | Status: needs_review
Priority: critical | Milestone:
Component: Tor bundles/installation | Version:
Keywords: | Parent:
--------------------------------------+-------------------------------------
Comment(by dkg):
I agree with Sebastian that simplifying and integrating into existing
systems is the right way forward, not to make the verification process
even more complex.
At its core, it sounds like the problem you're facing here is that old
packages have no expiration mechanism so users can realize that they
should look for a newer version.
It seems to me that this is best achieved through a combination of system-
specific cryptographic signatures with embedded expirations (for dealing
package installation time), and run-time version-checking against some
authoritative server that can declare (in a cryptographically-secure way)
"this version should no longer be run". I don't much like this kind of
"phone home" approach, but as i understand it, tor already needs to check
in with some authoritative servers to find its way into the network
anyhow. If that's the case, maybe those servers can be re-used for this
purpose?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2340#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs