Announcement
Collapse
No announcement yet.
Unverified software update
Collapse
This topic is closed.
X
X
-
I downloaded those updates for Kubuntu 13.04 without problem from the GB mirror. If you want to be sure that you're updating from a trusted source I would change the mirror site you download your updates from. It may just be a temporary problem affecting your current mirror.
- Top
- Bottom
-
The reason why I want to point this out is that this is actually my worst nightmare and the reason why I use Linux. I think everybody read how Microsoft automatic updates were cracked and I don't want to see this happening in Linux. Your system for sure runs but with open back door.
jalomann
twitter.com/jalomann
- Top
- Bottom
Comment
-
Pan-Galactic QuordlepleenSo Long, and Thanks for All the Fish
- Jul 2011
- 9524
- Seattle, WA, USA
- Send PM
Originally posted by jalomann View PostMicrosoft automatic updates were cracked
- Top
- Bottom
Comment
-
Originally posted by SteveRiley View PostDo you have a source for this claim?
http://arstechnica.com/security/2012...lame-pki-hack/
Chris Soghoian explains the consequences when automatic updates are compromised:
http://threatpost.com/chris-soghoian...r-061412/76690
Governmental spywares use the same mechanism, usually Adobe Flash update.
- Top
- Bottom
Comment
-
Originally posted by sithlord48 View Postthere is a repo that you maybe added without the repo key so the packages can not be varifed as untampered
- Top
- Bottom
Comment
-
Pan-Galactic QuordlepleenSo Long, and Thanks for All the Fish
- Jul 2011
- 9524
- Seattle, WA, USA
- Send PM
Originally posted by jalomann View PostSure. It was a big mess about one year ago. I found these with quick google search.
http://arstechnica.com/security/2012...lame-pki-hack/
Flame was signed with a fraudulent certificate purportedly from the Microsoft Enforced Licensing Intermediate PCA certificate authority. The malware authors identified a Microsoft Terminal Server Licensing Service certificate that inadvertently was enabled for code signing and that still used the weak MD5 hashing algorithm, then produced a counterfeit copy of the certificate that they used to sign some components of the malware to make them appear to have originated from Microsoft. A successful collision attack against a certificate was previously demonstrated in 2008, but Flame implemented a new variation of the chosen-prefix collision attack.Last edited by SteveRiley; Jul 24, 2013, 08:39 AM.
- Top
- Bottom
Comment
Comment