TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

KeePass2 v 2.34 to fix update security problem

73 点作者 SNvD7vEJ将近 9 年前
From the KeePass site: http:&#x2F;&#x2F;keepass.info&#x2F;help&#x2F;kb&#x2F;sec_issues.html#updsig<p><i>In order to prevent a man in the middle from making KeePass display incorrect version information (even though this does not imply a successful attack, see above), the version information file is now digitally signed (using RSA-2048 and SHA-512).<p>KeePass 2.34 and higher only accept such a digitally signed version information file. This solution is more secure than just using HTTPS, because it guarantees version information safety even when the webserver is compromised (the private key for signing the version information is not stored on the webserver).</i><p>Downloads page: http:&#x2F;&#x2F;keepass.info&#x2F;download.html<p>Edit: The update has NOT yet been released, as of (CET 11:30 2016-06-06)

7 条评论

dchest将近 9 年前
This is a partial fix, but it&#x27;s not enough. An attacker performing man-in-the-middle attack can respond with the previous version of &quot;version information file&quot;, preventing the update.<p>Imagine if there&#x27;s a vulnerability in one version of KeePass2, and the fix is available for it. MiTM attacker sends the previous version so that the app doesn&#x27;t know that there&#x27;s an update, and the attacker has more time to use the vulnerability.<p>HTTPS prevents this. They should do both.
评论 #11845776 未加载
评论 #11848002 未加载
评论 #11850479 未加载
评论 #11845744 未加载
评论 #11845754 未加载
Sephr将近 9 年前
&gt; Downloads page: <i>http</i>:&#x2F;&#x2F;keepass.info&#x2F;download.html<p>I still see a glaring MitM vulnerability…<p>Until the author actually switches to HTTPS, network operators can simply hijack the original downloads page in the first place. This update is barely a mitigation.<p>If he wants more ad revenue, his only option is to find another ad network. Eventually someone else is going to start hosting a popular fork on a different HTTPS site if he keeps stubbornly ignoring this issue.
评论 #11845837 未加载
评论 #11845838 未加载
cyphar将近 9 年前
Why not just switch to using The Update Framework (TUF)[1]. It solves many, many, many attacks against updating systems and we really should be using it everywhere.<p>[1]: <a href="https:&#x2F;&#x2F;theupdateframework.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;theupdateframework.github.io&#x2F;</a>
评论 #11848820 未加载
3onyc将近 9 年前
Why don&#x27;t they put the update file on a subdomain with HTTPS enabled? No ad revenue lost that way.
评论 #11845819 未加载
VoidWhisperer将近 9 年前
My question is: Would they have released this update if the person who came forward about the fact that KeePass said that they wouldn&#x27;t fix it didn&#x27;t?
评论 #11845704 未加载
评论 #11845752 未加载
BerSerKer将近 9 年前
Since the post about this problem a few days ago I&#x27;ve stopped using KeePass and began using Password Safe. Good program.
pieter_mj将近 9 年前
Allowing these type of programs to autonotify of updates and self-update should be considered bad practice and a high security risk.<p>Why risk a malicious MITM-ed update? The keepass site should just provide portable zips and off-site hashes and sigs for verification.