On Thu, Sep 18, 2008 at 10:59 AM, sebb <[EMAIL PROTECTED]> wrote: > On 18/09/2008, Hiram Chirino <[EMAIL PROTECTED]> wrote: >> On Wed, Sep 17, 2008 at 9:42 PM, William A. Rowe, Jr. >> >> <[EMAIL PROTECTED]> wrote: >> >> > Similarly, the issue of signature validation is a significant flaw which >> > I also hope maven addresses even more promptly, and which they are aware >> > of. The alternatives are to take down maven until it is secure, or to >> > continue to populate maven with various released artifacts. And this too >> > isn't germane to the question above, which is; >> >> >> The signature validation issue has a simple fix which I have already >> mentioned earlier. I'm not sure why folks continue to think it's >> still a problem. All the projects need to do is enable a checksum >> validation plugin, and at least that problem is resolved. >> > > Not sure I agree that the checksum plugin solves the problem. > > As far as I can tell, all that the plugin does is to detect any > changes to dependencies that occur *after the checksum list is > initially generated*
Agreed. > > Unless I'm mistaken, it does not guard against the orignal dependency > already being corrupt, nor does it protect the product itself. > So the responsibility is still on us, the upstream distributor, to verify the the checksums we list in our source distro are correct. But at least by doing this, down stream users of our source distros can rest assured that the dependencies that they are using are the correct ones. If a committer by mistake adds an invalid checksum for an artifact that he been hacked in his repo, hopefully, another developer doing the build will notice that the build fails due to checksum error if he has the valid artifact. At that point they can investigate who has the valid copy of the artifact. The more users that are building the software with the checksum validation, the better of chance you got at some one noticing a hacked repo artifact. If by chance all repos being used only have the hacked version of the artifact and, no one notices it hacked and we release with that.. then that would be a serious issue yes. I think we should handle that like we would handle any serious security flaw in our products. Re-release with the flaw (checksum) corrected and advise all our users to upgrade. On a side note.. a GPG web of trust would help in trusting the original binary checksum. Note that down stream users of our source distro may not trust people we trust, so they may want those checksums anyways. > What's to stop the checksum list being corrupted? > >> >> -- >> Regards, >> Hiram >> >> Blog: http://hiramchirino.com >> >> Open Source SOA >> http://open.iona.com >> >> --------------------------------------------------------------------- >> >> To unsubscribe, e-mail: [EMAIL PROTECTED] >> For additional commands, e-mail: [EMAIL PROTECTED] >> >> > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED] > > -- Regards, Hiram Blog: http://hiramchirino.com Open Source SOA http://open.iona.com --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]