Re: md5sums files
* Harald Braumann <email@example.com> [100303 14:49]:
> As a means to check for filesystem corruptions or non-malicious changes,
> MD5 is good enough. So until we have something better, I guess they can
I'd even say they should stay. The shorter the hash the more useable.
And md5 is the shortest well-defined and readily available everywhere.
> But it would be great if the whole chain, from beginning to end, was
> secured, even against a malicious and presumably very powerful attackers.
Checksums for files coming from packages is not really useful to defend
against attackers (it's really only reliablity and not security):
- an attacker can just divert any binary away and put it's own there.
- an attacker can just add some additional binary where it will override
another one (/sbin overriding /usr/sbin and so on).
- an attacker can add things to configuration and startup files
(thanks to .d directories you often not even need changing but only
adding files), including search binary or library paths, so one could
add binaries or behaviour changing libraries in directories not
looking that suspicious.
Most of those things can perhaps be fixed, but it needs much work
than just replacing some hash. (And many of those tasks might also
improve other areas (like http://packages.debian.org/cruft also having
the problem that packages create so many files and there is no way a
package can tell such programs where they are).
> For the hash I would skip SHA-1 and move directly to SHA-256.
And not to forget to add the size. Being allowed to create arbitrary
large files makes attacking interated hashes much easier...
Bernhard R. Link
"Never contain programs so few bugs, as when no debugging tools are available!"