From: Vladimir Diaz <vladimir.v.diaz@gmail.com>
To: gentoo-portage-dev@lists.gentoo.org
Cc: Justin Cappos <jcappos@nyu.edu>,
Patrick Schleizer <patrick-mailinglists@whonix.org>,
adrelanos grayson <adrelanos@riseup.net>
Subject: Re: [gentoo-portage-dev] Portage and Update Security
Date: Sun, 15 Mar 2015 18:27:06 -0400 [thread overview]
Message-ID: <CAOyQwLgPWb1drbm_H0PgnzjPB_rDM4KLBoBf53Gw2j=WjQnxFw@mail.gmail.com> (raw)
In-Reply-To: <CAAr7Pr9OSXa8YyHitSKzQQB57s2YgSHXPKAbvcvCJ+fO0c+EAg@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 4562 bytes --]
On Sat, Mar 14, 2015 at 7:18 PM, Alec Warner <antarus@gentoo.org> wrote:
> On Tue, Mar 10, 2015 at 2:15 PM, Vladimir Diaz <vladimir.v.diaz@gmail.com>
> wrote:
>
>> Hi,
>>
>> I am a developer in the Secure Systems Lab at NYU. Our lab has
>> collaborated with popular software update systems in the open-source
>> community, including APT, yum, and YaST, to address security problems.
>> More recently, we have been working on a flexible security framework
>> co-developed with the Tor project that can be easily added to software
>> updaters to transparently solve many of the known security flaws we have
>> uncovered in software updaters. We would like to work with The Portage
>> Development Project to better secure the Portage distribution system.
>>
>
> I'm not familiar with your work on APT, do you have a link?
>
There are LWN.net <http://lwn.net/Articles/327847/> and ;login:
<https://www.usenix.org/legacy/publications/login/2009-02/openpdfs/samuel.pdf>
articles, and an Ubuntu bug report
<https://bugs.launchpad.net/ubuntu/+source/apt/+bug/247445>, that discuss
some of the architectural and security improvements adopted (at the time)
by APT and other package managers. The A Look In the Mirror: Attacks on
Package Managers
<https://isis.poly.edu/~jcappos/papers/cappos_mirror_ccs_08.pdf> paper
<https://bugs.launchpad.net/ubuntu/+source/apt/+bug/247445>goes into more
detail.
>
>
>> TUF
>> <https://github.com/theupdateframework/tuf#a-framework-for-securing-software-update-systems>
>> (The Update Framework) is a library that can be added to an existing
>> software update system and is designed to update files in a more secure
>> manner. Many software updaters verify software updates with cryptographic
>> signatures and hash functions, but they typically fail to protect against
>> malicious attacks that target the metadata and update files presented to
>> clients. A rollback attack is one such example, where an attacker tricks a
>> client into installing older files than those the client has already seen
>> (these older files may be vulnerable versions that have since been fixed).
>> A full list of attacks and weaknesses the framework is designed to address
>> is provided here
>> <https://github.com/theupdateframework/tuf/blob/develop/SECURITY.md#security>
>> .
>>
>> Our website <http://theupdateframework.com/index.html> includes more
>> information about TUF, including: papers
>> <https://github.com/theupdateframework/tuf/tree/develop/docs/papers> and
>> a specification
>> <https://github.com/theupdateframework/tuf/blob/develop/docs/tuf-spec.txt>.
>> If you want to see how an existing project integrates TUF, there is a
>> standards track proposal
>> <https://github.com/pypa/interoperability-peps/blob/master/pep-0458-tuf-online-keys.rst#abstract>
>> to the Python community that you can review. A more rigorous proposal that
>> requires more administrative work on the repository, but provides more
>> security protections, is also available
>> <https://www.python.org/dev/peps/pep-0480/>.
>>
>> We were thinking of submitting a pull request that shows how such an
>> integration would work. So there hopefully won't be much leg work on your
>> end apart from deciding how the system should be configured (key storage,
>> roles, etc.).
>>
>
>> Would a pull request be of interest? Is there anything you'd like us to
>> say more about?
>>
>
> I guess I am less concerned with adding support to portage (which as you
> note, is likely fairly straightforward) vs actually generating, publishing,
> and signing the metadata; which you would have convince the infrastructure
> team to do.
>
How can we contact the infrastructure team? I searched the Gentoo mailing
list page <https://www.gentoo.org/main/en/lists.xml> and found
"gentoo-infrastructure", but it is a restricted list.
>
>
>> Thanks,
>> Vlad
>>
>> P.S.
>> There are Informational <http://wiki.gentoo.org/wiki/GLEP:57> and Standards
>> Track <http://wiki.gentoo.org/wiki/GLEP:58> GLEPs that reference our
>> work and the security issues that our project addresses, but there hasn't
>> been much recent activity on these proposals.
>>
>
> FWIW, I would rather adopt the standard than continue with a gentoo
> specific thing; but I'm not the guy who is going to implement it. I would
> recommend talking to the GLEP author (robbat2@gentoo.org)
>
Thank you. We'll contact the GLEP author to discuss the standard.
>
> -A
>
>
>>
>>
>> --
>> vladimir.v.diaz@gmail.com
>> PGP fingerprint = ACCF 9DCA 73B9 862F 93C5 6608 63F8 90AA 1D25 3935
>> --
>>
>
>
[-- Attachment #2: Type: text/html, Size: 7585 bytes --]
next prev parent reply other threads:[~2015-03-15 22:27 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-03-10 21:15 [gentoo-portage-dev] Portage and Update Security Vladimir Diaz
2015-03-11 15:35 ` Rick "Zero_Chaos" Farina
2015-03-11 18:54 ` Zac Medico
2015-03-14 23:18 ` Alec Warner
2015-03-15 22:27 ` Vladimir Diaz [this message]
2015-03-16 1:23 ` Brian Dolbec
2015-07-14 14:43 ` Vladimir Diaz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAOyQwLgPWb1drbm_H0PgnzjPB_rDM4KLBoBf53Gw2j=WjQnxFw@mail.gmail.com' \
--to=vladimir.v.diaz@gmail.com \
--cc=adrelanos@riseup.net \
--cc=gentoo-portage-dev@lists.gentoo.org \
--cc=jcappos@nyu.edu \
--cc=patrick-mailinglists@whonix.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox