Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Dec 2017 14:53:26 -0800
From:      John-Mark Gurney <jmg@funkthat.com>
To:        Michelle Sullivan <michelle@sorbs.net>
Cc:        Yuri <yuri@rawbw.com>, Igor Mozolevsky <mozolevsky@gmail.com>, freebsd security <freebsd-security@freebsd.org>, RW <rwmaillists@googlemail.com>
Subject:   Re: http subversion URLs should be discontinued in favor of https URLs
Message-ID:  <20171210225326.GK5901@funkthat.com>
In-Reply-To: <5A2DB80D.3020309@sorbs.net>
References:  <20171205231845.5028d01d@gumby.homeunix.com> <CADWvR2gVn8H5h6LYB5ddwUHYwDtiLCuYndsXhJywi7Q9vNsYvw@mail.gmail.com> <20171210173222.GF5901@funkthat.com> <CADWvR2iGQOtcU=FnU-fNsso2eLCCQn=swnOLoqws%2B33V8VzX1Q@mail.gmail.com> <5c810101-9092-7665-d623-275c15d4612b@rawbw.com> <CADWvR2j_LLEPKnSynRRmP4LG3mypdkNitwg%2B7vSh=iuJ=JU09Q@mail.gmail.com> <fd888f6b-bf16-f029-06d3-9a9b754dc676@rawbw.com> <CADWvR2jnxVwXmTA9XpZhGYnCAhFVifqqx2MvYeSeHmYEybaNnA@mail.gmail.com> <19bd6d57-4fa6-24d4-6262-37e1487d7ed6@rawbw.com> <5A2DB80D.3020309@sorbs.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Michelle Sullivan wrote this message on Mon, Dec 11, 2017 at 09:41 +1100:
> Yuri wrote:
> > On 12/10/17 10:15, Igor Mozolevsky wrote:
> >> They are not "hypothetical characters," they are invented characters 
> >> that
> >> are used in a threat model. But that's reframing the problem- a
> >> hypothetical threat model is very different to a real threat model.
> >
> >
> > This is a very real threat model. There are a lot of malicious Tor 
> > exit node operators, and a lot of FreeBSD users update their system 
> > over subversion. The only thing that the Tor node operator needs to do 
> > is to detect relevant requests and serve malware.
> >
> > How is this not real?
> 
> Sounds to me the proper solution is stop using Tor.
> 
> If you can't trust the network (wire) no matter what you do you can't 
> guarantee safety.

IMO, all security needs to be node-to-node.  It needs to be assumed
that the network is compromised.  Be it public wifi, tor, or malicious
actor rerouting traffic via BGP spoofing, node-to-node protection is
the answer to all of those.

Considering that China has redirected large segments of the inet traffic
through them, you can't even trust the inet back bone to be secure.  I
know I've never gotten notification from my ISP that my traffic may have
been compromised this way, and w/o notification, I cannot properly assess
what may have been compromised.

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171210225326.GK5901>