On 8/6/20 3:54 AM, [email protected] wrote:
On Thursday, 6 August 2020 12:31:44 UTC+8, Emily wrote:


    -- I'm not unman, but I just checked the repo data and it appears
    they use sha256


This is reassuring. Thanks, Emily

I hate to break that feeling, but Fedora is unique in that it doesn't sign its repo metadata, and sadly that is what matters. They put a bandaid on it by fetching more hashes via https... so the update security in Fedora is based on the strength of https. That is bad, as https can be subverted by resourceful attackers.

https://bugzilla.redhat.com/show_bug.cgi?id=1130491

What this potentially allows is an attacker to blind Fedora systems to specific package updates, where the systems appear to retrieve updates normally without the users being aware that particular packages with known vulnerabilities have been held back.

Note that RHEL and Centos _do_ sign their repomd.xml. So we're looking at some kind of decision made either by Red Hat's marketing department (keep Fedora off RHEL's expensive turf) or by some idea that Fedora is not for serious mission critical environments, or both.

So this is a sizable hole in Qubes security. The best advice I can give is to avoid using Fedora templates and pay attention to Qubes Security Bulletins when they mention which dom0 components will be updated (and pay close attention when running qubes-dom0-update to look for the mentioned components).

--
Chris Laprise, [email protected]
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ca8adf5-f8bc-3995-2db3-10c347835b72%40posteo.net.

Reply via email to