ubuntu distro hashes insecure against MITM attacks
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ubuntu-website-content |
Triaged
|
Undecided
|
Unassigned |
Bug Description
ubuntu offers an overview to get hashes of download files at https:/
It then takes me to http://
This HTTP resource is not protected against MITM attackers. Basically that means that when MITM is able to compromize the download, MITM should also be able to compromize the hashes I want to test against. There is also no HTTPS-secured representation of these hashes available (e.g. http://
But there's a http://
I remember that there was once a HTTPS-secured web page containing all the hashes for at least the ubuntu 14.04.x downloads. I think this was really straight forward: Get the hash from a trusted source (via https) and compare with the hash of the download. In that sense, I consider the current state as a regression.
information type: | Private Security → Public Security |
Changed in ubuntu-website-content: | |
status: | New → Triaged |
There's some documentation about how to check the hash with gpg and which key is authorized at https:/ /help.ubuntu. com/community/ VerifyIsoHowto . This page is linked in https:/ /help.ubuntu. com/community/ UbuntuHashes . So finally, there is a statement available which key should be valid. Plus, this page is available via HTTPS so it cannot be altered via MITM.
However, this documentation might not be suitable for everybody (e.g. windows users?) and in any case it is ways too complicated and potentially defective for average users. I still think the hashes should again be made available via https, at least for practical reasons.
related: #1460242 #1359836 #1186793
which means the attack vector is relatively high compared how small it could be.