Are source updating mechanisms vulnerable to MITM attacks?

QIU Quan jackqq at gmail.com
Thu Dec 24 08:47:44 UTC 2009


It seems CVSup uses clear text, with neither server authentication as
SSH nor message authentication as PGP.

Is it possible to poison the DNS records and fire a man-in-the-middle
attack against the source updating procedure?

It seems portsnap uses a public key to verify downloads.

Are there some source updating mechanisms with authentication or verification?

Thanks.

-- 
裘佺 (QIU Quan) <jackqq at gmail.com>


More information about the freebsd-questions mailing list