public inbox for gentoo-portage-dev@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-portage-dev] Portage and Update Security
@ 2015-03-10 21:15 Vladimir Diaz
  2015-03-11 15:35 ` Rick "Zero_Chaos" Farina
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Vladimir Diaz @ 2015-03-10 21:15 UTC (permalink / raw
  To: gentoo-portage-dev; +Cc: Justin Cappos, Patrick Schleizer, adrelanos grayson

[-- Attachment #1: Type: text/plain, Size: 2834 bytes --]

Hi,

I am a developer in the Secure Systems Lab at NYU.  Our lab has
collaborated with popular software update systems in the open-source
community, including APT, yum, and YaST, to address security problems.
More recently, we have been working on a flexible security framework
co-developed with the Tor project that can be easily added to software
updaters to transparently solve many of the known security flaws we have
uncovered in software updaters.  We would like to work with The Portage
Development Project to better secure the Portage distribution system.

TUF
<https://github.com/theupdateframework/tuf#a-framework-for-securing-software-update-systems>
(The Update Framework) is a library that can be added to an existing
software update system and is designed to update files in a more secure
manner.  Many software updaters verify software updates with cryptographic
signatures and hash functions, but they typically fail to protect against
malicious attacks that target the metadata and update files presented to
clients.  A rollback attack is one such example, where an attacker tricks a
client into installing older files than those the client has already seen
(these older files may be vulnerable versions that have since been fixed).
A full list of attacks and weaknesses the framework is designed to address
is provided here
<https://github.com/theupdateframework/tuf/blob/develop/SECURITY.md#security>
.

Our website <http://theupdateframework.com/index.html> includes more
information about TUF, including: papers
<https://github.com/theupdateframework/tuf/tree/develop/docs/papers> and a
specification
<https://github.com/theupdateframework/tuf/blob/develop/docs/tuf-spec.txt>.
If you want to see how an existing project integrates TUF, there is a
standards track proposal
<https://github.com/pypa/interoperability-peps/blob/master/pep-0458-tuf-online-keys.rst#abstract>
to the Python community that you can review.  A more rigorous proposal that
requires more administrative work on the repository, but provides more
security protections, is also available
<https://www.python.org/dev/peps/pep-0480/>.

We were thinking of submitting a pull request that shows how such an
integration would work.  So there hopefully won't be much leg work on your
end apart from deciding how the system should be configured (key storage,
roles, etc.).

Would a pull request be of interest?  Is there anything you'd like us to
say more about?

Thanks,
Vlad

P.S.
There are Informational <http://wiki.gentoo.org/wiki/GLEP:57> and Standards
Track <http://wiki.gentoo.org/wiki/GLEP:58> GLEPs that reference our work
and the security issues that our project addresses, but there hasn't been
much recent activity on these proposals.


--
vladimir.v.diaz@gmail.com
PGP fingerprint = ACCF 9DCA 73B9 862F 93C5  6608 63F8 90AA 1D25 3935
--

[-- Attachment #2: Type: text/html, Size: 3665 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2015-07-14 14:43 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-10 21:15 [gentoo-portage-dev] Portage and Update Security Vladimir Diaz
2015-03-11 15:35 ` Rick "Zero_Chaos" Farina
2015-03-11 18:54 ` Zac Medico
2015-03-14 23:18 ` Alec Warner
2015-03-15 22:27   ` Vladimir Diaz
2015-03-16  1:23     ` Brian Dolbec
2015-07-14 14:43       ` Vladimir Diaz

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox