[MacPorts] #51886: nmap @7.12 Minor portfile fixes
MacPorts
noreply at macports.org
Thu Jul 21 10:25:39 PDT 2016
#51886: nmap @7.12 Minor portfile fixes
--------------------------+------------------------------
Reporter: gavin@… | Owner: opendarwin.org@…
Type: enhancement | Status: new
Priority: Normal | Milestone:
Component: ports | Version:
Resolution: | Keywords: haspatch
Port: nmap |
--------------------------+------------------------------
Comment (by gavin@…):
Replying to [comment:4 dluke@…]:
> Replying to [comment:3 gavin@…]:
> > Not sure what you mean regarding upstream releases but i'll take your
word for it.
>
> If upstream provides an md5 or sha1 hash, it's useful to be able to have
the same hash in the portfile.
>
Got it.
> > I was just imagining a scenario where malicious code could be
introduced into the source taking advantage of the known hash collisions
but still making the checksum valid. I realise there's a number of very
specific conditions which would also need to be setup to make the scenario
actually exploitable but I just figured for a security related tool like
this, if possible, it would be better than not to deprecate these HMACs.
>
> Macports validates the distfile against all of the hashes in the
portfile. For that attack to work, you'd have to generate a malicious file
that collides with each hash listed (having a weak hash like md5 or sha1
doesn't stop Macports from using the sha256 checksum).
Ah there be my incorrect assumption. I thought checksumming was an 'OR'.
Thanks for clarifying.
--
Ticket URL: <https://trac.macports.org/ticket/51886#comment:5>
MacPorts <https://www.macports.org/>
Ports system for OS X
More information about the macports-tickets
mailing list