<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: wordpress.org Cracked, Exploit in 2.1.1 Release	</title>
	<atom:link href="/articles/wordpress-org-cracked-exploit-in-2-1-1-release/feed/" rel="self" type="application/rss+xml" />
	<link>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/</link>
	<description>Software Engineer and Consultant</description>
	<lastBuildDate>Sat, 29 Oct 2016 01:51:01 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Juergen Kreileder		</title>
		<link>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/comment-page-1/#comment-51902</link>

		<dc:creator><![CDATA[Juergen Kreileder]]></dc:creator>
		<pubDate>Sat, 03 Mar 2007 23:20:51 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/2007/03/03/wordpressorg-cracked-exploit-in-211-release/#comment-51902</guid>

					<description><![CDATA[Even if only 5% (that estimate probably is too high) would check the signature, a compromised download wouldn&#039;t go undetected for more than three days!

And you&#039;re right, downloading a untrusted key and a signed file at the same time is a bad idea! The key used for signing downloads has to be integrated into trust management, ie. it has be signed by well-known and trusted people.]]></description>
			<content:encoded><![CDATA[<p>Even if only 5% (that estimate probably is too high) would check the signature, a compromised download wouldn&#8217;t go undetected for more than three days!</p>
<p>And you&#8217;re right, downloading a untrusted key and a signed file at the same time is a bad idea! The key used for signing downloads has to be integrated into trust management, ie. it has be signed by well-known and trusted people.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David Precious		</title>
		<link>/articles/wordpress-org-cracked-exploit-in-2-1-1-release/comment-page-1/#comment-51900</link>

		<dc:creator><![CDATA[David Precious]]></dc:creator>
		<pubDate>Sat, 03 Mar 2007 22:22:31 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/2007/03/03/wordpressorg-cracked-exploit-in-211-release/#comment-51900</guid>

					<description><![CDATA[Signing releases with a PGP key would be a good idea, but of course 95% of the people installing WordPress probably wouldn&#039;t understand how to verify a PGP signature, or would be too lazy to do it.

Even if they do validate it, unless they get the public key from a trusted source that the cracker can&#039;t alter (e.g. from a keyserver) then it still doesn&#039;t add a massive amount of safety.  If the key was hosted on the site hosting the download, a cracker could just create a new key and sign their alterered code with that instead.]]></description>
			<content:encoded><![CDATA[<p>Signing releases with a PGP key would be a good idea, but of course 95% of the people installing WordPress probably wouldn&#8217;t understand how to verify a PGP signature, or would be too lazy to do it.</p>
<p>Even if they do validate it, unless they get the public key from a trusted source that the cracker can&#8217;t alter (e.g. from a keyserver) then it still doesn&#8217;t add a massive amount of safety.  If the key was hosted on the site hosting the download, a cracker could just create a new key and sign their alterered code with that instead.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
