Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rootless #63

Merged
merged 1 commit into from
May 24, 2023
Merged

rootless #63

merged 1 commit into from
May 24, 2023

Conversation

raidenii
Copy link
Contributor

closes #62

@kslr kslr merged commit 4bb372b into v2fly:master May 24, 2023
1 of 2 checks passed
@sly-net
Copy link

sly-net commented Apr 4, 2024

So, if an attacker performs successfully a man-in-the-middle attack to let the client believe he is github.com, in order to provide an infected v2ray zip archive to the client, the digest will not save the client (unless the attacker is stupid enough to forget to change the digest in addition to changing the zip file).

Well, that's simple: the digest should be provided locally instead of being fetched remotely...
The digest ensures we got the expected file from the server. It's not a way to control the transport integrity (TCP/TLS does this).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Allow container to run as non root
3 participants