* [gentoo-dev] GPG Signed packages
@ 2003-11-22 2:09 Yi Qiang
2003-11-22 4:38 ` Lisa Seelye
0 siblings, 1 reply; 7+ messages in thread
From: Yi Qiang @ 2003-11-22 2:09 UTC (permalink / raw
To: gentoo-dev
[-- Attachment #1: Type: text/plain, Size: 741 bytes --]
I think this has been brought up many times before, but as most of us
know, many of the debian servers have been compromised recently. This
has reinstated fear into many people about how "trustful" our distfile
repositories really are. If indeed one is compromised it would be too
easy for someone to slip a backdoor into a package, especially since I
and a lot of other gentoo users simply ignore md5 checksums. If a
digest fails we simply ebuild foo.ebuild digest it again. I think an
option should be made that would allow failing packages if gpg fails. (I
think Redhat does something like this) This of course is not a fool
proof way, but a big improvement over what is currently done to ensure
package integrity.
Yi
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 2:09 [gentoo-dev] GPG Signed packages Yi Qiang
@ 2003-11-22 4:38 ` Lisa Seelye
2003-11-22 5:24 ` Andrew Gaffney
` (2 more replies)
0 siblings, 3 replies; 7+ messages in thread
From: Lisa Seelye @ 2003-11-22 4:38 UTC (permalink / raw
To: khai; +Cc: Gentoo Dev
[-- Attachment #1: Type: text/plain, Size: 1162 bytes --]
On Fri, 2003-11-21 at 21:09, Yi Qiang wrote:
> I think this has been brought up many times before, but as most of us
> know, many of the debian servers have been compromised recently. This
> has reinstated fear into many people about how "trustful" our distfile
> repositories really are. If indeed one is compromised it would be too
> easy for someone to slip a backdoor into a package, especially since I
> and a lot of other gentoo users simply ignore md5 checksums. If a
> digest fails we simply ebuild foo.ebuild digest it again. I think an
> option should be made that would allow failing packages if gpg fails. (I
> think Redhat does something like this) This of course is not a fool
> proof way, but a big improvement over what is currently done to ensure
> package integrity.
If the key server/signature is compromised you have gained nothing over
the way we have it now. Adding it is just another way for something to
go wrong.
As for users doing ebuild foo.ebuild digest blindly - that's a good way
to put your box at serious risk.
--
Regards,
-Lisa
<Vix ulla tam iniqua pax, quin bello vel aequissimo sit potior>
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 4:38 ` Lisa Seelye
@ 2003-11-22 5:24 ` Andrew Gaffney
2003-11-22 9:13 ` Torsten Veller
2003-11-22 13:15 ` James Harlow
2 siblings, 0 replies; 7+ messages in thread
From: Andrew Gaffney @ 2003-11-22 5:24 UTC (permalink / raw
To: Gentoo Dev
Lisa Seelye wrote:
> On Fri, 2003-11-21 at 21:09, Yi Qiang wrote:
>
>>I think this has been brought up many times before, but as most of us
>>know, many of the debian servers have been compromised recently. This
>>has reinstated fear into many people about how "trustful" our distfile
>>repositories really are. If indeed one is compromised it would be too
>>easy for someone to slip a backdoor into a package, especially since I
>>and a lot of other gentoo users simply ignore md5 checksums. If a
>>digest fails we simply ebuild foo.ebuild digest it again. I think an
>>option should be made that would allow failing packages if gpg fails. (I
>>think Redhat does something like this) This of course is not a fool
>>proof way, but a big improvement over what is currently done to ensure
>>package integrity.
>
>
> If the key server/signature is compromised you have gained nothing over
> the way we have it now. Adding it is just another way for something to
> go wrong.
>
> As for users doing ebuild foo.ebuild digest blindly - that's a good way
> to put your box at serious risk.
I agree that the current system is good the way it is. If someone is dumb enough to ignore
a failing MD5 on anything other than MPlayer fonts, and I'm sure most of us have done
'ebuild digest mplayer-x.xx.ebuild' at one point or another (I have), another check isn't
going to keep them from opening up their box, anyway.
--
Andrew Gaffney
--
gentoo-dev@gentoo.org mailing list
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 4:38 ` Lisa Seelye
2003-11-22 5:24 ` Andrew Gaffney
@ 2003-11-22 9:13 ` Torsten Veller
2003-11-22 13:15 ` James Harlow
2 siblings, 0 replies; 7+ messages in thread
From: Torsten Veller @ 2003-11-22 9:13 UTC (permalink / raw
To: Gentoo Dev
* Lisa Seelye <lisa@gentoo.org>:
> On Fri, 2003-11-21 at 21:09, Yi Qiang wrote:
> > how "trustful" our distfile
> > repositories really are. If indeed one is compromised it would be too
> > easy for someone to slip a backdoor into a package, especially since I
> > and a lot of other gentoo users simply ignore md5 checksums.
Ignoring of md5 checksums is not even necessary. As a holder of a
distfile mirror i can put a patch in the 'files' dir and generate a
suitable md5. The user will not see that he got fooled/backdoored. And
best: If you wait long enough (after new version) the local distfiles
are overwritten and every evidence in /var/db/pkg is wiped out.
> If the key server/signature is compromised you have gained nothing over
> the way we have it now. Adding it is just another way for something to
> go wrong.
Yes, but as long as your key is not compromised everyone will see that
the distfiles come from the same source.
> As for users doing ebuild foo.ebuild digest blindly - that's a good way
> to put your box at serious risk.
ACK.
So the user should be able to verify that every file didnot get altered.
And this is only possible with signified sources.
--
.: Torsten | Don't tell any big lies today. Small ones can be :.
.: | just as effective. :.
--
gentoo-dev@gentoo.org mailing list
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 4:38 ` Lisa Seelye
2003-11-22 5:24 ` Andrew Gaffney
2003-11-22 9:13 ` Torsten Veller
@ 2003-11-22 13:15 ` James Harlow
2003-11-22 22:45 ` Aron Griffis
2 siblings, 1 reply; 7+ messages in thread
From: James Harlow @ 2003-11-22 13:15 UTC (permalink / raw
To: gentoo-dev
On Fri, Nov 21, 2003 at 11:38:55PM -0500, Lisa Seelye wrote:
> If the key server/signature is compromised you have gained nothing over
> the way we have it now.
This isn't true. GPG *can* be done with trusted keyservers, but as
you point out that's silly. The best way to do it is with the web of
trust. We generate a key for trusted@gentoo.org, who signs, say,
avenj's, drobbins's, and seemant's keys, and is then removed from the
computer and put onto 3 or so CD's (for redundancy), which are locked
away in a safe. avenj, drobbins and seemant go around signing every
developer's key (this is the hardest part because it shouldn't be
autmated).
The public key for trusted@gentoo.org is then posted to an area of
gentoo.org, made available on the mirrors, posted to keyservers, etc.
and the fingerprint is made widely available (mailinglists, IRC topics,
etc.). The gentoo developers and some of the gentoo powerusers
(hopefully the ones who are most active on the forums, mailinglists, and
IRC), sign the trusted@gentoo.org key.
We then have the following properties:
* everyone knows what the trusted@gentoo.org public key is.
* no-one knows, or can possibly find out, what the private key is.
* the widespread knowledge of the public key cannot easily be
changed.
This allows gentoo to distribute signed (by drobbins, seemant and avenj)
livecd's and stageballs that contain the public key itself. Users are
encouraged to verify these signatures and are told what the signatures
not matching means (ie, danger).
Let's examine a few things that can go wrong once this is in place:
A distfiles mirror is cracked: Lots of users download trojan'd packages,
which fail verification against the maintainer's GPG key. The cracker
can't fake a signature - that's one of the properties of a digital
signature. The mirror admin is notified, mirror is cleaned up. No
damage is done - in fact this is probably looks *good* for Gentoo. With
the current system, it would be easily possible to compromise hundred's
of people's machines.
A developer's machine is cracked, and his keys stolen: Fake packages are
uploaded, and possibly hundreds of machines are affected. This is pretty
bad. The developer issues a revocation of his key, which is propogated
in the same way that new keys are, and affected users find out that
their machines have been compromised and which specific packages caused
it. They can then start rebuilding their machines, or doing forensics,
or whatever. Contrast this with the current system, where we have to
hope that they hear the announcement, or come on IRC at the right time,
or whatever, in which case they have to do a fairly painful manual
investigation of all their packages.
(Worst case scenario): Drobbins's machine is cracked and his keys are
stolen. This is actually not much worse than a developer's keys being
stolen. Contrast this with how things are at the moment, which would be
disaster.
> Adding it is just another way for something to go wrong.
This is absolutely true. Public key infrastructure was never designed to
stop things going wrong - this is still a hard problem that rests with
administrators. What it does do is to make tampering much easier to
detect, and when things do go wrong to put them right much more quickly
and correctly than would otherwise be possible.
I hope I've convinced people this is valuable.
--
When a true genius appears in the world, you may know him by this sign, that the dunces are all in confederacy against him. - Jonathan Swift
--
gentoo-dev@gentoo.org mailing list
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 13:15 ` James Harlow
@ 2003-11-22 22:45 ` Aron Griffis
2003-11-23 10:45 ` Frank Zschockelt
0 siblings, 1 reply; 7+ messages in thread
From: Aron Griffis @ 2003-11-22 22:45 UTC (permalink / raw
To: gentoo-dev
[-- Attachment #1: Type: text/plain, Size: 890 bytes --]
James Harlow wrote: [Sat Nov 22 2003, 08:15:57AM EST]
> I hope I've convinced people this is valuable.
I was convinced already, but it's really nice to see some first steps
listed and some worst case scenarios covered.
md5sums help to prevent problems due to corrupted downloads and/or
corrupted mirrors. This can include corruption due to malicious
tampering. However it doesn't provide the avenues of detection and
containment provided by signatures. An additional benefit of signatures
is that they can only be generated by a developer, whereas md5sums can
be generated by whoever.
Would it be possible to store the signatures in a file separate from the
sources themselves, similar to the digests at the moment?
Aron
--
Aron Griffis
Gentoo Linux Developer (alpha / ia64 / ruby / vim)
Key fingerprint = E3B6 8734 C2D6 B5E5 AE76 FB3A 26B1 C5E3 2010 4EB0
[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [gentoo-dev] GPG Signed packages
2003-11-22 22:45 ` Aron Griffis
@ 2003-11-23 10:45 ` Frank Zschockelt
0 siblings, 0 replies; 7+ messages in thread
From: Frank Zschockelt @ 2003-11-23 10:45 UTC (permalink / raw
To: gentoo-dev
Es schrieb Aron Griffis (agriffis@gentoo.org):
> Would it be possible to store the signatures in a file separate from the
> sources themselves, similar to the digests at the moment?
Of course.
$ man gpg
[...]
-b, --detach-sign
Make a detached signature.
[...]
Franky
--
gentoo-dev@gentoo.org mailing list
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2003-11-23 10:44 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-11-22 2:09 [gentoo-dev] GPG Signed packages Yi Qiang
2003-11-22 4:38 ` Lisa Seelye
2003-11-22 5:24 ` Andrew Gaffney
2003-11-22 9:13 ` Torsten Veller
2003-11-22 13:15 ` James Harlow
2003-11-22 22:45 ` Aron Griffis
2003-11-23 10:45 ` Frank Zschockelt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox