[tor-bugs] #9931 [Website]: Securing the integrity of downloads from the Tor/Tails website

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Oct 8 20:24:08 UTC 2013


#9931: Securing the integrity of downloads from the Tor/Tails website
-------------------------------------------------+-------------------------
 Reporter:  tolodof                              |          Owner:
     Type:  defect                               |         Status:  new
 Priority:  major                                |      Milestone:
Component:  Website                              |        Version:  Tor:
 Keywords:  SSL, MITM, Verifying, Download,      |  unspecified
  Website                                        |  Actual Points:
Parent ID:                                       |         Points:
-------------------------------------------------+-------------------------
 Currently when downloading Tor or Tails from the website, we are advised
 to download a signature file to verify the integrity of the download. As
 the website acknowledges though, despite using SSL this provides no
 protection against a MITM attack, meaning that both the program and
 signature downloads could be compromised.

 This same problem applies to downloading the programs necessary to verify
 the signature is correct, such as gpg4win, whose website doesn't even use
 SSL.

 However, as explained here https://www.grc.com/fingerprints.htm, I believe
 there is a solution to this problem, namely using an Extended Validation
 certificate for the Tor/Tails website. Because these certificates are
 embedded in Firefox and Chrome and thus are not vulnerable to being
 tampered with, as certs in an external store are, these browsers can
 indicate when a SSL connection is using one of these certs and assures the
 user that when visiting the site, they are not subject to a MITM attack.

 Therefore, the user can be certain that when downloading the program and
 signature from the Tor/Tails website, it is in fact being downloaded from
 there and nowhere else. I think to complete the circle, it would be
 necessary to host whatever program is needed to verify the signature on
 the Tor website as well and not have this downloaded from an external
 website, which even if it uses SSL could expose the user to a MITM attack
 and result in them downloading a compromised version of the verification
 program. The MD5 Reborned addon for Firefox https://addons.mozilla.org/en-
 US/firefox/addon/md5-reborned-hasher/ does at least download from a site
 using an EV cert, so users can be sure they're not subject to a MITM
 attack when downloading that but you are still relying on this website not
 being hacked and the download being replaced with a compromised one. I
 guess the dev-team are best placed to decide whether any such breach would
 be publicised immediately by Mozilla, allowing users to protect
 themselves, or if it would be better to host all downloads on the Tor
 website.

 There would of course still be the chance that the Tor web server could be
 hacked and the program/signature downloads replaced with compromised ones
 but I'm sure this would be caught fairly soon, whereas a MITM attack could
 result in users relying on compromised versions of the software for a long
 time without any idea.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9931>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list