ISO self-verification is insecure
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ubuntu-website-content |
New
|
Undecided
|
Unassigned |
Bug Description
https:/
While I go along that this is sufficiant to check against random errors (transmission/
Proof-of-concept:
IF an attacker (e.g. MITM, CD-Shop, download mirror etc.) can manipulate an ISO THEN he or she also can manipulate hashing tools like md5sum, shasum, sha256sum.
The hashing tool could e.g. always output the original hash of the ISO. Or, more sophisticated, do this only if the incoming file has known properties like a known file size. As a result, verification is passed although it should not pass for a compromised media.
There should at least be a warning on the web site, otherwise users feel in non-existent safety.
information type: | Private Security → Public Security |