Bug#857888: Debian 9 RC ISO installers lacks apt-transport-https package

2017-03-15 Thread of....@protonmail.com
Package: debian-9-rcX.iso
Version: debian-9-rc1/2/+?

The Debian 9 RC installers now allow for HTTPS APT repos, but they will not 
work because apt-transport-https is missing (and thus cannot parse HTTPS 
sources during installation).

I suggest adding apt-transport-https to the new RC installer images so that 
HTTPS sources can work during the public release of Debian 9.

Tested Debian 9 RC 1, 2, and dailies.

Bug#814798: debian-installer: enable encrypting /boot using GRUB cryptomount

2017-03-16 Thread of....@protonmail.com
I would also like to express a vote for true full disk encryption within the 
Debian installer. The current form of FDE leaves the /boot partition 
unencrypted. This can be fixed and has been tested on Debian Stretch to work. 
The process should be as so:

* Create RAID / DM / MD devices (if necessary to combine multiple physical 
devices)

* Create one encrypted base volume, and utilize LVM2 for each desired partition 
on top of the encrypted volume (eg. /boot, /home, /, swap, etc).

The installer will run fine in this configuration, but the final grub install 
will fail. This is because of the following needs to be added:

/etc/default/grub
GRUB_ENABLE_CRYPTODISK=y

Upon that, grub-install / update-grub should work fine and become bootable. 
Since the encrypted volume is the first volume to be unlocked upon reboot, you 
will be asked for your crypto disk unlock key twice, and I am not sure of a 
secure way around that. Using an external key added to the LUKS slot to 
automatically boot, as some have suggested, allows decryption of all partitions 
if that key is lost or stolen. The device needs to be unlocked twice since 
first time is for /boot to load the kernel, and the second time is to load the 
standard partitions previously defined.

The debian-installer needs to enable support for the Grub cryptodisk option in 
order to make any progress in a true FDE configuration where the /boot 
partition is protected. Currently, Debian's "FDE" is slightly more vulnerable 
to the "Evil Maid" attacks if the attacker modifies the kernel boot image, 
which is unencrypted. They may even do so in a way that waits until all 
partitions are unlocked before planting a backdoor post-boot in the user's 
decrypted environment. Eg. stealing local keys from /home. As such, at the 
present time, the Debian "Full Disk Encryption" should actually be called 
"Partial Disk Encryption".

Bug#858009: Debian "Full Disk Encryption" is a misnomer, /boot not encrypted, Evil Maid attacks, enable grub cryptodisk, improve guided encrypted partitioning

2017-03-17 Thread of....@protonmail.com
Package: debian-installer
Version: stretch-rc2

The Debian Stretch RC2 installer and previous versions do not allow Full Disk 
Encryption since /boot is more vulnerable to Evil Maid attacks due to it being 
unencrypted. Securing /boot makes Evil Maid attacks slightly more difficult, 
raising the cost / time for an adversary with physical access.

I suggest looking at prior bugs from over a year ago suggesting how to start 
fixing this by enabling the cryptodisk option for grub, then modifying the 
debian-installer flows to automatically partition using a base encrypted volume 
for which all other partitions / LVM2 groups sit atop of, including /boot. This 
would hopefully replace the current and slightly more insecure "Guided - Use 
Entire Disk and Set Up Encrypted LVM..." option.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814798

Tested Debian Stretch RC2 and prior versions.

Bug#865649: cups HTTPS issues -- Lack of SHA-2 certificate, weak TLSv1.0 crypto

2017-06-23 Thread of....@protonmail.com
Package: cups
Version: 2.2.1-8

* SHA-1 is officially deprecated for HTTPS certificates, but is still used for 
cups certificate generation.
* TLSv1.0 is enabled for cups, but TLSv1.0 with CBC / SHA-1 is potentially 
vulnerable to BEAST attacks.

I suggest two resolutions to correct this, even though it is understood that 
default certificates are self-signed anyway.

* Generate SHA-2 signed certificates by default. This will lessenthe additional 
browser warnings.
* Enable only TLSv1.2 for the cups HTTPS interface and disable CBC and SHA-1 
crypto. TLSv1.0 has numerous known, potential security issues with CBC / SHA-1 
suites. All current web clients support TLSv1.2 and so disabling TSLv1.0 should 
have no negative effect for local Debian users and is likely to also have 
virtually no impact for remote cups users as well accessing the cups interface 
remotely.

Verified on Debian GNU/Linux 9

Bug#865649: cups HTTPS issues -- Lack of SHA-2 certificate, weak TLSv1.0 crypto)

2017-06-24 Thread of....@protonmail.com
Was TLSv.1.0 already disabled back in July 2015 and this is a regression or is 
it time now to disable it permanently and completely in the default config? See 
below a prior changelog.
cups (2.1~b1-1)
* New 2.1~b1 release
disable TLS/1.0 support.
-- Didier Raboud  Thu, 09 Jul 2015