From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 22906 invoked by uid 1002); 7 Sep 2003 19:48:52 -0000 Mailing-List: contact gentoo-dev-help@gentoo.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@gentoo.org Received: (qmail 21551 invoked from network); 7 Sep 2003 19:48:51 -0000 From: Jan Krueger Organization: microgalaxy.net To: azarah@gentoo.org Date: Sun, 7 Sep 2003 21:54:20 +0000 User-Agent: KMail/1.5.2 Cc: Gentoo-Dev , Thomas de Grenier de Latour References: <1062962428.8455.154.camel@nosferatu.lan> <200309072143.47126.jk@microgalaxy.net> In-Reply-To: <200309072143.47126.jk@microgalaxy.net> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200309072154.20407.jk@microgalaxy.net> Subject: Re: [gentoo-dev] suggestion rsync over ssl/ssh X-Archives-Salt: df88bb31-b817-4d50-b0fb-c06cd479a287 X-Archives-Hash: f8aeacf4d150a52bb8ceff4fcc4228f2 On Sunday 07 September 2003 21:43, Jan Krueger wrote: > No. I trust you. But trusting you doesnt mean that the ebuild you checked > in to the tree arrives at my hardrive unmodified. There is no way for you > as a human beeing to garantee this to me. Instead it should be expected > that the ebuild gets modified (by faulty software/hardware/network/whatever > or by a malicious attacker). So this must be taken care of. I give you an example: With so many gentoo-rsync hosts spread all over and the use of unencripted rsync transfer a man in the middle attack (eg. by arp-spoofing or whatever), that inserts an malicious ebuild along with digest and Manifest into the rsync stream is very much imaginable to me. So i suggest to, as quickly as possible, establish the infrastucture to do rsync over ssl/ssl or other secure transport. Jan -- gentoo-dev@gentoo.org mailing list