Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 16 Oct 2014 18:45:18 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: attacking hsts through ntp



On 16/10/14 06:32 PM, Michael Samuel wrote:
> On 16 October 2014 23:03, Hanno Böck <hanno@...eck.de> wrote:
>> Same should work for HPKP. The idea of setting some security feature
>> through a header needs a revisit.
>> The solution would be to have a more reliable PC time. How do we do
>> that?
> 
> A Date: header?
> 

You can't trust remote servers you're getting the content from... what
if I send wonky times to try and screw with your browser? Or header
injection attacks? No thanks.

-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ