On Mon, Jul 03, 2017 at 01:01:35AM +0200, Ismael Bouya wrote:
> (Mon, Jul 03, 2017 at 12:29:44AM +0200) Morten Linderud :
> > But HTTPS doesnt matter here. We have a trusted signer inn the PKGBUILD, 
> > anyone can MITM for the good of their life.
> > Unless they can fake the signature (Hint; they cant), or trick Lennart into 
> > signing something he shouldnt (Hint; he
> > wont), we don't have a case here. It doesn't really matter if its HTTP or 
> > HTTPS.
> > 
> > You also didn't really reply about the threat model.
> 
> If I understand correctly what Nicohood meant,
> what could happen is that version X of systemd (or anything else) has a
> well known vulnerability, fixed in X+1. X+1 is packaged, so anyone
> up to date thinks "good I'm safe now". But since a man in the middle can
> force to download version X (signed by the systemd maintainer so
> considered "secure"), he can force you to download that version when you
> create the package and you'll think you have the safe version while
> having the unsafe one.
> 
> If that happens to the packager in archlinux, then you poisoned all
> archlinux users.
> 
> (but then, the md5sum will be wrong anyway?)
> -- 
> Ismael


At this point we can't trust the trusted users to build and verify the correct 
packages, let alone maintaine a safe
infrastructure to build packages. This is a slippery slope, and i really 
fucking hope this isn't a serious issue any
devs or TUs are afraid of.


-- 
Morten Linderud

PGP: 9C02FF419FECBE16

Attachment: signature.asc
Description: PGP signature

Reply via email to