Subject: bin/2912: mtree(8) checksums
To: None <gnats-bugs@gnats.netbsd.org>
From: Chris Jones <cjones@rupert.oscs.montana.edu>
List: netbsd-bugs
Date: 11/01/1996 12:35:15
>Number:         2912
>Category:       bin
>Synopsis:       cksum is not secure
>Confidential:   no
>Severity:       serious
>Priority:       low
>Responsible:    bin-bug-people (Utility Bug People)
>State:          open
>Class:          change-request
>Submitter-Id:   net
>Arrival-Date:   Fri Nov  1 11:50:01 1996
>Last-Modified:
>Originator:     Chris Jones
>Organization:
-------------------------------------------------------------------------------
Chris Jones                                      cjones@rupert.oscs.montana.edu
           Mad scientist in training...
"Is this going to be a stand-up programming session, sir, or another bug hunt?"
>Release:        1.1
>Environment:
	
System: NetBSD rupert.oscs.montana.edu 1.2_BETA NetBSD 1.2_BETA (SLIM) #7: Tue Aug 6 19:52:09 MDT 1996 cjones@rupert.oscs.montana.edu:/home/src/sys/arch/mac68k/compile/SLIM mac68k


>Description:
	
Mtree just uses a CRC from the cksum program to do its checksum.
However, as I understand things, this algorithm is generally regarded
as easy to fool; a hacker could read the checksum from the mtree file,
make a trojan horse out of whatever binary, and then pad the binary
until it had the right CRC.
>How-To-Repeat:
	
>Fix:
	
MD4, MD5, or something similarly robust.
>Audit-Trail:
>Unformatted: