replace verified setup as it is vulnerable to backdooring #308
Lunarequest
started this conversation in
General
Replies: 1 comment 6 replies
-
Hi @Lunarequest 👋 I like the idea, I will update you on this ASAP. |
Beta Was this translation helpful? Give feedback.
6 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Select Topic Area
Feedback
Body
Background
Currently the verified loader on the wiki is this
This however while it looks safe, is more dangerous than the non verified setup. Now you may ask, why is it more dangerous? The answer is very simple. 2 very quick curls happen. The first one is done to check the sha256sum. Then in quick succession we have a another call to curl, that is not verified. A server does not need to in any world return the same content in quick succession.
Theoretically the web server could do the following, Upon the first curl to init.zshell.dev return a redirect to github as intended. However if the request from the same ip occurs in a very short amount of time, return a backdoored version of zi-shell. This could also be extended to allow multiple requests in a day from the same ip and hence every time you open a new shell, a backdoor being implanted.
Other issues include the curl using http which is possible to Man in the middle. This is straightforward to fix so I am not going to dive into it further
Solution
The solution is simple. Avoid using curl as much as possible and we using it, enforce https. My solution is the following.
we save the curl output to
/tmp
essentially caching zi between reboots. Along with this I have made a change to fall back to the local zi install, as say if your network is down/extremely slow or you aren't connected to the internetreturn 1
effectively locks your out of terminals.Code of Conduct
Beta Was this translation helpful? Give feedback.
All reactions