Skip to content

Profile based on files' fingerprint #1839

@PhilJbt

Description

@PhilJbt

What would you like to add or change?:
To prevent a file (i.e. an executable on Windows) from gaining network access by replacing another legitimate file, the profile linked to a file should keep its fingerprint (e.g. a simple CRC-32 hash).
If the fingerprint of a file doesn't fit the stored one, Portmaster could warn the user of the situation and ask if the profile's rules needs to be reset, or the stored fingerprint to be updated.

Why do you and others need this?:
Beyond the fact that unusual behavior might be easier to detect when knowing a file has just been modified, the fact that a malicious file can replace a previously validated one is a security issue (on Windows in particular, both with regard to third-party programs and built-in services).

Metadata

Metadata

Assignees

No one assigned

    Labels

    staleATTRIBUTE: this issue has not had recent activitysuggestionTYPE: idea for new feature or improvements

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions