ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    My Journey to Becoming a Linux End User on Linux Mint

    IT Discussion
    linux linux desktop linux mint
    15
    116
    37.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @BRRABill
      last edited by

      @BRRABill said:

      @scottalanmiller said:

      In a "do what I say, not what I do" mode, remember it is always good to do an MD5 check of your downloads. Protects against most cases of this kind of thing.

      They also hacked that on the website, didn't they?

      They might have, can't recall the exact working, on the WordPress site (one more reason I'm scared to death of standing up a WP site). But there were many other sources of the MD5 hash on other pages that were unaffected. Granted that wouldn't help most - why would you ever go out of your way to verify the MD5 has to more than one site.

      I saw a question - why not move to a signed ISO, you check the cert signature and you're golden - the Mint guys said they were looking into that.

      BRRABillB 1 Reply Last reply Reply Quote 0
      • BRRABillB
        BRRABill @Dashrender
        last edited by

        @Dashrender said:

        I saw a question - why not move to a signed ISO, you check the cert signature and you're golden - the Mint guys said they were looking into that.

        From the comments on that page, it seems a lot of the stuff the Mint guys were doing were not 100% secure.

        Hopefully they can learn from this and move on.

        I said to @scottalanmiller it's almost ridiculous how you can't be secure anywhere.

        DashrenderD 1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender @BRRABill
          last edited by

          @BRRABill said:

          @Dashrender said:

          I saw a question - why not move to a signed ISO, you check the cert signature and you're golden - the Mint guys said they were looking into that.

          From the comments on that page, it seems a lot of the stuff the Mint guys were doing were not 100% secure.

          Hopefully they can learn from this and move on.

          I said to @scottalanmiller it's almost ridiculous how you can't be secure anywhere.

          Does anyone sign their ISOs today?

          JaredBuschJ 1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @Dashrender
            last edited by JaredBusch

            @Dashrender said:

            @BRRABill said:

            @Dashrender said:

            I saw a question - why not move to a signed ISO, you check the cert signature and you're golden - the Mint guys said they were looking into that.

            From the comments on that page, it seems a lot of the stuff the Mint guys were doing were not 100% secure.

            Hopefully they can learn from this and move on.

            I said to @scottalanmiller it's almost ridiculous how you can't be secure anywhere.

            Does anyone sign their ISOs today?

            Pretty much all places offer MD5 hashes.

            But if I was trying to hijack a distro, I would post an updated hash too.

            1 Reply Last reply Reply Quote 1
            • BRRABillB
              BRRABill
              last edited by

              Even the hacker agrees (from an article on ZDNET)...

              The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.

              "Who the f**k checks those anyway?" the hacker said.

              stacksofplatesS DashrenderD 2 Replies Last reply Reply Quote 0
              • stacksofplatesS
                stacksofplates @BRRABill
                last edited by stacksofplates

                @BRRABill said:

                Even the hacker agrees (from an article on ZDNET)...

                The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.

                "Who the f**k checks those anyway?" the hacker said.

                Maybe people who use Linux Mint don't, but people who install things regularly do. Figuring out your ISO doesn't work by trying to install and it failing is a waste of time.

                Plus it may install, but packages could be missing or other strange things.

                BRRABillB 1 Reply Last reply Reply Quote 0
                • BRRABillB
                  BRRABill @stacksofplates
                  last edited by

                  @johnhooks

                  No I meant that he changed the legitimate checksum.

                  stacksofplatesS 1 Reply Last reply Reply Quote 0
                  • stacksofplatesS
                    stacksofplates @BRRABill
                    last edited by

                    @BRRABill said:

                    @johnhooks

                    No I meant that he changed the legitimate checksum.

                    Right, but he asked who checks them anyway. I was answering that part.

                    BRRABillB 1 Reply Last reply Reply Quote 0
                    • BRRABillB
                      BRRABill @stacksofplates
                      last edited by

                      @johnhooks

                      Ah. Yeah, probably a small percentage.

                      And if they can also be hacked, what's the difference really?

                      stacksofplatesS 1 Reply Last reply Reply Quote 0
                      • stacksofplatesS
                        stacksofplates @BRRABill
                        last edited by

                        @BRRABill said:

                        And if they can also be hacked, what's the difference really?

                        At least you'll know it will install correctly 😛

                        I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.

                        BRRABillB 1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @BRRABill
                          last edited by

                          @BRRABill said:

                          Even the hacker agrees (from an article on ZDNET)...

                          The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.

                          "Who the f**k checks those anyway?" the hacker said.

                          lol - even Scott said - do as I say, not as I do.. LOL

                          1 Reply Last reply Reply Quote 0
                          • BRRABillB
                            BRRABill @stacksofplates
                            last edited by

                            @johnhooks said:

                            I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.

                            You trust a torrent more than a site such as linuxmint?

                            DashrenderD 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @BRRABill
                              last edited by

                              @BRRABill said:

                              @johnhooks said:

                              I pretty much download ISOs from torrents if it's possible. It's faster, and these kinds of things don't happen.

                              You trust a torrent more than a site such as linuxmint?

                              Exactly - why would you trust a torrent more than a website download?

                              1 Reply Last reply Reply Quote 0
                              • stacksofplatesS
                                stacksofplates
                                last edited by

                                The torrent file comes from the website, then it builds from the seeders.

                                DashrenderD 1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @stacksofplates
                                  last edited by

                                  @johnhooks said:

                                  The torrent file comes from the website, then it builds from the seeders.

                                  What prevents the hacker from seeding a bad torrent?

                                  stacksofplatesS scottalanmillerS 2 Replies Last reply Reply Quote 0
                                  • stacksofplatesS
                                    stacksofplates @Dashrender
                                    last edited by stacksofplates

                                    @Dashrender said:

                                    @johnhooks said:

                                    The torrent file comes from the website, then it builds from the seeders.

                                    What prevents the hacker from seeding a bad torrent?

                                    They would be the only one seeding it.

                                    Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.

                                    DashrenderD 1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender @stacksofplates
                                      last edited by

                                      @johnhooks said:

                                      @Dashrender said:

                                      @johnhooks said:

                                      The torrent file comes from the website, then it builds from the seeders.

                                      What prevents the hacker from seeding a bad torrent?

                                      They would be the only one seeding it.

                                      Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.

                                      hack the page, call it a new version - seed the fake one to torrents - ok probably to many places to get caught.. but still possible.

                                      stacksofplatesS 1 Reply Last reply Reply Quote 0
                                      • stacksofplatesS
                                        stacksofplates @Dashrender
                                        last edited by stacksofplates

                                        @Dashrender said:

                                        @johnhooks said:

                                        @Dashrender said:

                                        @johnhooks said:

                                        The torrent file comes from the website, then it builds from the seeders.

                                        What prevents the hacker from seeding a bad torrent?

                                        They would be the only one seeding it.

                                        Everything sent through a torrent is hashed, so they would somehow have to change everyone's copy of the ISO.

                                        hack the page, call it a new version - seed the fake one to torrents - ok probably to many places to get caught.. but still possible.

                                        Right, it would take so long for that to happen that it would kind of be useless. If you change the direct download ISO then you've got everyone who downloaded it. However that's not the case with the torrents.

                                        There is also no guarantee that anyone will seed from you either. You could sit there all day and maybe only a couple people seed a few parts from you.

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Dashrender
                                          last edited by

                                          @Dashrender said:

                                          @johnhooks said:

                                          The torrent file comes from the website, then it builds from the seeders.

                                          What prevents the hacker from seeding a bad torrent?

                                          MD5 Checksumming 🙂

                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender @scottalanmiller
                                            last edited by

                                            @scottalanmiller said:

                                            @Dashrender said:

                                            @johnhooks said:

                                            The torrent file comes from the website, then it builds from the seeders.

                                            What prevents the hacker from seeding a bad torrent?

                                            MD5 Checksumming 🙂

                                            I meant doing their own seed, not trying to replace the real one.

                                            JaredBuschJ scottalanmillerS 2 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 5 / 6
                                            • First post
                                              Last post