Date: Sun, 10 Dec 2017 14:53:26 -0800 From: John-Mark Gurney <jmg@funkthat.com> To: Michelle Sullivan <michelle@sorbs.net> Cc: Yuri <yuri@rawbw.com>, Igor Mozolevsky <mozolevsky@gmail.com>, freebsd security <freebsd-security@freebsd.org>, RW <rwmaillists@googlemail.com> Subject: Re: http subversion URLs should be discontinued in favor of https URLs Message-ID: <20171210225326.GK5901@funkthat.com> In-Reply-To: <5A2DB80D.3020309@sorbs.net> References: <20171205231845.5028d01d@gumby.homeunix.com> <CADWvR2gVn8H5h6LYB5ddwUHYwDtiLCuYndsXhJywi7Q9vNsYvw@mail.gmail.com> <20171210173222.GF5901@funkthat.com> <CADWvR2iGQOtcU=FnU-fNsso2eLCCQn=swnOLoqws%2B33V8VzX1Q@mail.gmail.com> <5c810101-9092-7665-d623-275c15d4612b@rawbw.com> <CADWvR2j_LLEPKnSynRRmP4LG3mypdkNitwg%2B7vSh=iuJ=JU09Q@mail.gmail.com> <fd888f6b-bf16-f029-06d3-9a9b754dc676@rawbw.com> <CADWvR2jnxVwXmTA9XpZhGYnCAhFVifqqx2MvYeSeHmYEybaNnA@mail.gmail.com> <19bd6d57-4fa6-24d4-6262-37e1487d7ed6@rawbw.com> <5A2DB80D.3020309@sorbs.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Michelle Sullivan wrote this message on Mon, Dec 11, 2017 at 09:41 +1100: > Yuri wrote: > > On 12/10/17 10:15, Igor Mozolevsky wrote: > >> They are not "hypothetical characters," they are invented characters > >> that > >> are used in a threat model. But that's reframing the problem- a > >> hypothetical threat model is very different to a real threat model. > > > > > > This is a very real threat model. There are a lot of malicious Tor > > exit node operators, and a lot of FreeBSD users update their system > > over subversion. The only thing that the Tor node operator needs to do > > is to detect relevant requests and serve malware. > > > > How is this not real? > > Sounds to me the proper solution is stop using Tor. > > If you can't trust the network (wire) no matter what you do you can't > guarantee safety. IMO, all security needs to be node-to-node. It needs to be assumed that the network is compromised. Be it public wifi, tor, or malicious actor rerouting traffic via BGP spoofing, node-to-node protection is the answer to all of those. Considering that China has redirected large segments of the inet traffic through them, you can't even trust the inet back bone to be secure. I know I've never gotten notification from my ISP that my traffic may have been compromised this way, and w/o notification, I cannot properly assess what may have been compromised. -- John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171210225326.GK5901>