From owner-freebsd-current@FreeBSD.ORG Wed Jun 21 09:51:36 2006 Return-Path: X-Original-To: freebsd-current@freebsd.org Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1BB2D16A47C; Wed, 21 Jun 2006 09:51:36 +0000 (UTC) (envelope-from delphij@delphij.net) Received: from tarsier.geekcn.org (tarsier.geekcn.org [210.51.165.229]) by mx1.FreeBSD.org (Postfix) with ESMTP id C86B343D4C; Wed, 21 Jun 2006 09:51:33 +0000 (GMT) (envelope-from delphij@delphij.net) Received: from localhost (tarsier.geekcn.org [210.51.165.229]) by tarsier.geekcn.org (Postfix) with ESMTP id 90911EB1322; Wed, 21 Jun 2006 17:51:31 +0800 (CST) X-Virus-Scanned: amavisd-new at geekcn.org Received: from tarsier.geekcn.org ([210.51.165.229]) by localhost (mail.geekcn.org [210.51.165.229]) (amavisd-new, port 10024) with ESMTP id UZIZjUN3WGjU; Wed, 21 Jun 2006 17:51:24 +0800 (CST) Received: from [10.217.12.210] (sina152-194.staff.sina.com.cn [61.135.152.194]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by tarsier.geekcn.org (Postfix) with ESMTP id 56D3EEB122D; Wed, 21 Jun 2006 17:51:21 +0800 (CST) From: Xin LI To: Harti Brandt In-Reply-To: <20060621082734.Q24109@beagle.kn.op.dlr.de> References: <4498D108.90907@rogers.com> <20060621053007.GA3320@odin.ac.hmc.edu> <4498DF20.8020803@rogers.com> <1150870137.78122.14.camel@spirit> <20060621082734.Q24109@beagle.kn.op.dlr.de> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-n0OyBZb9ftsT1HbKiXIX" Organization: The FreeBSD Project Date: Wed, 21 Jun 2006 17:51:19 +0800 Message-Id: <1150883479.78122.20.camel@spirit> Mime-Version: 1.0 X-Mailer: Evolution 2.6.2 FreeBSD GNOME Team Port Cc: Mike Jakubik , freebsd-current@freebsd.org, Justin Hibbits Subject: Re: ~/.hosts patch X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Jun 2006 09:51:36 -0000 --=-n0OyBZb9ftsT1HbKiXIX Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, Harti, =E5=9C=A8 2006-06-21=E4=B8=89=E7=9A=84 08:31 +0200=EF=BC=8CHarti Brandt=E5= =86=99=E9=81=93=EF=BC=9A > On Wed, 21 Jun 2006, Xin LI wrote: [snip] > XL>successfully exploit the ~/.hosts to get privilege escalation and/or > XL>information disclosure or something else, which could not happen witho= ut > XL>~/.hosts? >=20 > Wouldn't this enable the same kind of phishing attacks there are under=20 > windows? As far as I remember there are attacks where the hosts file=20 > (don't remember how its called under windows) is rewriten by a virus/java= =20 > script/whatever to contain a different IP address for a given hostname?=20 > Suppose someone fakes the website of www.foobank.com, then manages to=20 > insert www.foobank.com with the wrong IP address into ~/.hosts? Well, if the user would not see a HTTPS certificate before entering his or her password, then it would be highly possible that the user would run under the "root" credential, where /etc/hosts can also be altered. =20 But instead of getting this into a bikeshed, let's see the way we are seeking to make it (to add the functionality as a NSS module). I think a NSS module would provide the functionality yet allowing anyone to choose whether to enable or disable it :-) Cheers, --=20 Xin LI http://www.delphij.net/ --=-n0OyBZb9ftsT1HbKiXIX Content-Type: application/pgp-signature; name=signature.asc Content-Description: =?UTF-8?Q?=E8=BF=99=E6=98=AF=E4=BF=A1=E4=BB=B6=E7=9A=84=E6=95=B0?= =?UTF-8?Q?=E5=AD=97=E7=AD=BE=E5=90=8D=E9=83=A8=E5=88=86?= -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (FreeBSD) iD8DBQBEmRaXhcUczkLqiksRAhwEAJ9iUSgKzlLw4slnS64MPRt9HwZ98QCgyi6y QpFvOq/lDw4QP4FxOvXJQqw= =lB2Z -----END PGP SIGNATURE----- --=-n0OyBZb9ftsT1HbKiXIX--