-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Joanna Rutkowska:
> The attacker can always DoS the update process -- in the simplest
> example by cutting off ones internet connection.
I believe HW42 was primarily concerned about an attacker blocking
updates silently ("without [causing] yum warnings"). Blocking
downloads completely will certainly generate some warning/error messages.
> But I'm pretty sure that you/rpm won't allow for package downgrade,
> version-wise, no matter what the repo metadata says.
HW42's described scenario will not result in your client installing an
older version that it already has, but it might prevent you from
installing a newer version than you already have because yum doesn't
know about the newer version. I believe this is feasible, but to know
for sure you would have to try it out.
-----BEGIN PGP SIGNATURE-----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=mo8B
-----END PGP SIGNATURE-----