linuxdcpp-team team mailing list archive
-
linuxdcpp-team team
-
Mailing list archive
-
Message #07935
[Bug 991342] Re: KEYP Vulnerability
Re: moving the source removal.
It is possible to move it, just something I overlooked, because only
downloaders (ie. servers) need to do it. The patch delays the trust
option check for accepted connections which means it is technically
possible to so the removal in the same case as checkKeyprint().
--
You received this bug notification because you are a member of
Dcplusplus-team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/991342
Title:
KEYP Vulnerability
Status in DC++:
New
Bug description:
With the current vulnerability with DC++'s current KEYP implementation
the underlying issue seems to be this ...
[2012-04-26 09:24] <Crise> anyways, the thing with keyp is entirely
different problem... which is basically that it only verifies keyp on
the peer level certificate and not on the whole chain as it should
Crise has stated he has another source who knows the exploit but will
not divulge in who he is.
To manage notifications about this bug go to:
https://bugs.launchpad.net/dcplusplus/+bug/991342/+subscriptions
References