* Julian Mehnle ([EMAIL PROTECTED]) [031210 13:40]:
> Joey Hess <[EMAIL PROTECTED]> wrote:
> > Goswin von Brederlow wrote:
> > > What can we do with deb signatures?
> > >
> > > For our current problem, the integrity of the debian archive being
> > > questioned, the procedure would be easy and avail
"Julian Mehnle" <[EMAIL PROTECTED]> writes:
> Joey Hess <[EMAIL PROTECTED]> wrote:
> > Goswin von Brederlow wrote:
> > > What can we do with deb signatures?
> > >
> > > For our current problem, the integrity of the debian archive being
> > > questioned, the procedure would be easy and available to
Joey Hess <[EMAIL PROTECTED]> wrote:
> Goswin von Brederlow wrote:
> > What can we do with deb signatures?
> >
> > For our current problem, the integrity of the debian archive being
> > questioned, the procedure would be easy and available to every user:
> >
> > 1. get any clean Debian keyring (or
On Fri, 2003-12-05 at 22:46, Goswin von Brederlow wrote:
> > No it isn't. For it to be non-repudiable, you'd have to demonstrate that
> > the key has not been compromised; that the developer knew what he was
> > signing (as opposed to a trojaned gpg telling him one thing while doing
> > another);
Henning Makholm <[EMAIL PROTECTED]> writes:
> Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
>
> > If a package is compromised we can proof that the DD of the package
> > either is malicious or incompetent.
>
> Say, we just had a major compromise on certain Debian machines. Pray
> tell, who d
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]:
> > Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
> > > If a package is compromised we can proof that the DD of the package
> > > either is malicious or incompetent.
>
> > Say, we just had a maj
* Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]:
> Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
> > If a package is compromised we can proof that the DD of the package
> > either is malicious or incompetent.
> Say, we just had a major compromise on certain Debian machines. Pray
> tell,
Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
> If a package is compromised we can proof that the DD of the package
> either is malicious or incompetent.
Say, we just had a major compromise on certain Debian machines. Pray
tell, who do you think this proves is malicious or incompetent? We'd
c
Anthony DeRobertis <[EMAIL PROTECTED]> writes:
> On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote:
>
> > > The only one which comes to mind is a rogue Debian developer that
> > > you do not wish to trust, even though the project trusts him.
> >
> > Not quite. The signed deb is non-repudia
Matt Zimmerman <[EMAIL PROTECTED]> writes:
> On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote:
>
> > Matt Zimmerman <[EMAIL PROTECTED]> writes:
> >
> > > Release signing protects against a hostile or compromised mirror,
> > > network, DNS server, proxy server, and a host of o
On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote:
> > The only one which comes to mind is a rogue Debian developer that
> > you do not wish to trust, even though the project trusts him.
>
> Not quite. The signed deb is non-repudiable authorship -- nice
> to know whence the software come
On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote:
> Matt Zimmerman <[EMAIL PROTECTED]> writes:
>
> > Release signing protects against a hostile or compromised mirror,
> > network, DNS server, proxy server, and a host of other, similar attacks,
> > and also prevents most forms
Matt Zimmerman <[EMAIL PROTECTED]> writes:
> On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote:
>
> > Signed debs establish a trust chain from the buildd to the user and
> > from the buildd-admin/maintainer to the user as well as copy the
> > existing trust chain from ftp-maste
Matt Zimmerman <[EMAIL PROTECTED]> writes:
> On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote:
>
> > I wrote a little script that checks what apt things its installing
> > against what the control files of the debs say. I will test it with
> > some more fakes and then file it
On Thu, 4 Dec 2003 14:41:43 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said:
> On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote:
>> On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]>
>> said:
>>
>> > What kind of real world attacks do signed debs prevent? Not a
* Matt Zimmerman ([EMAIL PROTECTED]) [031204 22:25]:
> On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote:
> > On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote:
> > > What kind of real world attacks do signed debs prevent?
> > >
> > > The only one which comes to mind i
On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote:
> I wrote a little script that checks what apt things its installing
> against what the control files of the debs say. I will test it with
> some more fakes and then file it in the BTS.
Why would you do this with a script rathe
On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote:
> On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote:
> > What kind of real world attacks do signed debs prevent?
> >
> > The only one which comes to mind is a rogue Debian developer that you do
> > not wish to trust,
On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote:
> On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote:
>
> > On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said:
> >
> > > What kind of real world attacks do signed debs prevent? Not a
> > > com
On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote:
> On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said:
>
> > What kind of real world attacks do signed debs prevent? Not a
> > compromised buildd, or a compromised maintainer's workstation.
>
> It wo
On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said:
> What kind of real world attacks do signed debs prevent? Not a
> compromised buildd, or a compromised maintainer's workstation.
It would allow me to copy .debs around with other people, or
use .debs not made a
On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote:
> Signed debs establish a trust chain from the buildd to the user and
> from the buildd-admin/maintainer to the user as well as copy the
> existing trust chain from ftp-master to the user into the deb itself.
>
> The Release.gp
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]:
> > Andreas Barth <[EMAIL PROTECTED]> writes:
>
> > > Ok?
>
> > Sounds ok but the upload rules can be tightened much much later. First
> > we have to get signing started, which means fixing ap
* Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]:
> Andreas Barth <[EMAIL PROTECTED]> writes:
> > Ok?
> Sounds ok but the upload rules can be tightened much much later. First
> we have to get signing started, which means fixing apt-utils or
> debsigs or preferably both. And of cause cha
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]:
> > Op wo 03-12-2003, om 10:09 schreef Andreas Barth:
> > > > > file back signed by the build admin. The debian archive scripts
> > > > > accepts packages signed by a buildd-key only if it is a binary
* Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]:
> Op wo 03-12-2003, om 10:09 schreef Andreas Barth:
> > > > file back signed by the build admin. The debian archive scripts
> > > > accepts packages signed by a buildd-key only if it is a binary package
> > > > for this architecture, the key is
Matt Zimmerman <[EMAIL PROTECTED]> writes:
> On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote:
>
> > Matt Zimmerman <[EMAIL PROTECTED]> writes:
> >
> > > On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
> > >
> > > > But this kind of tampering _can_ be c
Wouter Verhelst <[EMAIL PROTECTED]> writes:
> Op wo 03-12-2003, om 10:09 schreef Andreas Barth:
> > > > file back signed by the build admin. The debian archive scripts
> > > > accepts packages signed by a buildd-key only if it is a binary package
> > > > for this architecture, the key is valid (i.
Op wo 03-12-2003, om 10:09 schreef Andreas Barth:
> > > file back signed by the build admin. The debian archive scripts
> > > accepts packages signed by a buildd-key only if it is a binary package
> > > for this architecture, the key is valid (i.e. in the right year), and
> > > this package has bee
On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said:
> I'm also a bit concerned about MitM attacks; the hash-or-whatever which
Obviously you can do this only using a secure channel.
> the local side is supposed to sign should probably be encrypted with the
> signer's public key, otherwise I
On Wed, 3 Dec 2003 12:08:10 +0100, Matthias Urlichs said:
>> signature algorithm would allow for hashing the data on the remote
>> machine, and signing that hash locally.
>>
> ... that would work. It'd probably require a few hooks within GPG
> to generate a hash packet / .
Since I moved my actua
On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote:
> Matt Zimmerman <[EMAIL PROTECTED]> writes:
>
> > On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
> >
> > > But this kind of tampering _can_ be checked by apt before installing
> > > the deb simply by ad
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:25]:
> Henning Makholm <[EMAIL PROTECTED]> writes:
> > If an attacker compromises the buildd to the point where he can gain
> > access to its secret key, he could just as well attack its build
> > environment, or simply use his access to convinc
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:40]:
> Andreas Barth <[EMAIL PROTECTED]> writes:
> > * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]:
> > > So unless you have a suggestion that would solve this particular issue,
> > > I'm afraid this idea won't work in practice.
> > Two
Hi,
Werner Koch:
> On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said:
> > the local side is supposed to sign should probably be encrypted with the
> > signer's public key, otherwise I can just replace the data packet with
> > something that ends up signing a totally different file. :-/
>
>
Matthias Urlichs <[EMAIL PROTECTED]> writes:
> Hi,
>
> Werner Koch:
> > There are some minor problems because we don't just sign a hash but
> > need to add some more data. Creating an incomplete hash on the remote
> > machine is not the cleanest solution, so I have to come up with a
> > better w
Wouter Verhelst <[EMAIL PROTECTED]> writes:
> On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
> > Hi, Henrique de Moraes Holschuh wrote:
> >
> > > On Tue, 02 Dec 2003, Wouter Verhelst wrote:
> > >> So unless you have a suggestion that would solve this particular issue,
> > >> I'
Hi,
Werner Koch:
> There are some minor problems because we don't just sign a hash but
> need to add some more data. Creating an incomplete hash on the remote
> machine is not the cleanest solution, so I have to come up with a
> better way.
>
You're the GPG expert...
I'm also a bit concerned a
* Chad Walstrom <[EMAIL PROTECTED]> [031202 18:14]:
> I'm not following your logic, if that's what you call it. You're saying
> that checking the current filesystem on a daily basis is NOT a good way
> to verify filesystem integrity?
I say it won't give you an real advantage over checking the *.m
On Wed, Dec 03, 2003 at 12:08:10PM +0100, Matthias Urlichs wrote:
> Wouter Verhelst:
> > Especially in the case of larger .debs, that would probably reduce the
> > actual signature size as well...
>
> ?? A hash is a hash, and should be independent of file size.
Obviously, sorry. I don't know how
Hi,
[ I'm Cc-ing Werner Koch on this ]
Wouter Verhelst:
> On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
> > Hi, Henrique de Moraes Holschuh wrote:
> >
> > > On Tue, 02 Dec 2003, Wouter Verhelst wrote:
> > >> So unless you have a suggestion that would solve this particular iss
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote:
> Bernd Eckenfels <[EMAIL PROTECTED]> writes:
> > How often has this person glance over the results? As I understand debian
> > build daemons run unattended and build continously. Correct me when I am
> > wrong here.
> >
> > Bu
On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote:
> Hi, Henrique de Moraes Holschuh wrote:
>
> > On Tue, 02 Dec 2003, Wouter Verhelst wrote:
> >> So unless you have a suggestion that would solve this particular issue,
> >> I'm afraid this idea won't work in practice.
> >
> > We co
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote:
> On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote:
> > Joey Hess <[EMAIL PROTECTED]> wrote:
> > > Goswin von Brederlow wrote:
> > >> > dpkg that it is downgrading the package, and a clever attacker might
> > >> > avoid
Matt Zimmerman <[EMAIL PROTECTED]> writes:
> On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
>
> > But this kind of tampering _can_ be checked by apt before installing
> > the deb simply by adding a signature verifyer into the
> > DPkg::Pre-Install-Pkgs config option, the sa
Bernd Eckenfels <[EMAIL PROTECTED]> writes:
> On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote:
> > What the admins signature can gives us is a trusted timestamp and
> > another pair of eyes reading the changes files.
>
> Well, a trusted timestamp can be added/required by a th
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote:
> You change the contents of the compromised Packages file, so that
> Package: bash
> is accompanied by
> Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb
> which contains a perfectly valid .deb file, signed by a DD,
Anthony Towns writes:
> On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote:
> > You change the contents of the compromised Packages file, so that
> > Package: bash
> > is accompanied by
> > Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb
> > which contains a perfect
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote:
[TSP]
> If there is no person sitting there signing it manually its useless.
Why is that? I trust an automated service to provide me signed timestamps. In
fact
a Box doing exactly this and nothing else can be very securely lock
Scott James Remnant <[EMAIL PROTECTED]> writes:
> On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote:
>
> > Scott James Remnant <[EMAIL PROTECTED]> writes:
> >
> > > No Cc was necessary, I am subscribed to debian-devel.
> > >
> >
> I can only assume you ignored this out of either spite or
On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote:
> Scott James Remnant <[EMAIL PROTECTED]> writes:
>
> > No Cc was necessary, I am subscribed to debian-devel.
> >
>
I can only assume you ignored this out of either spite or stupidity.
I don't mind too much if people forget the code of c
On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote:
> But this kind of tampering _can_ be checked by apt before installing
> the deb simply by adding a signature verifyer into the
> DPkg::Pre-Install-Pkgs config option, the same mechanism
> apt-listchanges already uses to display
Henning Makholm <[EMAIL PROTECTED]> writes:
> Scripsit Goswin von Brederlow
> > Henning Makholm <[EMAIL PROTECTED]> writes:
>
> > > I refer you to Ken Thompson's Turing award lecture. If someone who
> > > really means business manages to compromise binary toolchain debs, all
> > > the hackers in
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]:
> > So unless you have a suggestion that would solve this particular issue,
> > I'm afraid this idea won't work in practice.
>
> Two suggestions come to my mind. However, I can't judge how useful
> t
On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote:
> What the admins signature can gives us is a trusted timestamp and
> another pair of eyes reading the changes files.
Well, a trusted timestamp can be added/required by a third party. No need to
bother a build admin with signing
Henning Makholm <[EMAIL PROTECTED]> writes:
> Scripsit Wouter Verhelst <[EMAIL PROTECTED]>
>
> > Requiring us to log in to the autobuilder to sign the .deb remotely is
> > not acceptable, for two reasons:
> > * it's way too much work for most of us
> > * it requires copying the secret key over, w
Joey Hess <[EMAIL PROTECTED]> writes:
> Andreas Metzler wrote:
> > I still don't understand how you change the version number (or the
> > package-name) without breaking the signature.
>
> Which signature? The Packages file is being modified, so of course the
> hain of trust back to the Release fi
Scott James Remnant <[EMAIL PROTECTED]> writes:
> No Cc was necessary, I am subscribed to debian-devel.
>
> On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote:
>
> > Scott James Remnant <[EMAIL PROTECTED]> writes:
> >
> > > A compromised dinstall on ftp-master could also replace the keyrin
Chad Walstrom <[EMAIL PROTECTED]> writes:
> On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote:
> > > A true IDS is needed, such as aide, tripwire, or cfengine to detect
> > > post-installation intrusion. Tie in aide or tripwire database
> > > checks/updates with the apt.conf "PostI
Andreas Metzler <[EMAIL PROTECTED]> writes:
> Joey Hess <[EMAIL PROTECTED]> wrote:
> > Goswin von Brederlow wrote:
> >> > dpkg that it is downgrading the package, and a clever attacker might
> >> > avoid even that.
>
> >> How would you avoid it?
>
> > Make the replacement package really be a dif
Wouter Verhelst <[EMAIL PROTECTED]> writes:
> Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow:
> [...]
> > Deb signatures method C:
> >
> > And now for something completly different. A man with 3 noses. :)
> >
> > Instead of keeping extra files with the signature of the deb the
> > infor
Scripsit Goswin von Brederlow
> Henning Makholm <[EMAIL PROTECTED]> writes:
> > I refer you to Ken Thompson's Turing award lecture. If someone who
> > really means business manages to compromise binary toolchain debs, all
> > the hackers in the world reading source over and over will not find
> >
Steve Langasek <[EMAIL PROTECTED]> wrote:
> On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote:
>> Joey Hess <[EMAIL PROTECTED]> wrote:
>> > Goswin von Brederlow wrote:
>> >> > dpkg that it is downgrading the package, and a clever attacker might
>> >> > avoid even that.
>> >> How woul
Henning Makholm <[EMAIL PROTECTED]> writes:
> Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
>
> > There is no security as strong as many people reading the source over
> > and over. You can't hack their brains to skip over the backdoor code
> > and you can only obfuscate a backdoor so much.
>
* Steve Langasek ([EMAIL PROTECTED]) [031202 22:10]:
> AFAIK, apt does not sanity check the relationship between package names
> and filenames (and it's not obvious that this should be part of its
> responsibilities), and dpkg only gets a list of .debs to install once
> they've been downloaded.
So
Hi, Henrique de Moraes Holschuh wrote:
> On Tue, 02 Dec 2003, Wouter Verhelst wrote:
>> So unless you have a suggestion that would solve this particular issue,
>> I'm afraid this idea won't work in practice.
>
> We could verify if the gpg agent (gpa? I forget the name...) cannot do this
> over a
* Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]:
> As much as I like this idea in principle, storing signatures inside
> .debs has a serious problem: it won't work for us buildd maintainers.
Workability for the buildd maintainers is IMHO _certainly_ one
important thing.
> As I explain in my
Scripsit Wouter Verhelst <[EMAIL PROTECTED]>
> Requiring us to log in to the autobuilder to sign the .deb remotely is
> not acceptable, for two reasons:
> * it's way too much work for most of us
> * it requires copying the secret key over, which is, uh, a bad idea.
Um, perhaps this is really stup
On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote:
> Joey Hess <[EMAIL PROTECTED]> wrote:
> > Goswin von Brederlow wrote:
> >> > dpkg that it is downgrading the package, and a clever attacker might
> >> > avoid even that.
> >> How would you avoid it?
> > Make the replacement package
Andreas Metzler wrote:
> I still don't understand how you change the version number (or the
> package-name) without breaking the signature.
Which signature? The Packages file is being modified, so of course the
hain of trust back to the Release file signature can be used to catch
tampering with it
Wouter Verhelst wrote:
> Requiring us to log in to the autobuilder to sign the .deb remotely is
> not acceptable, for two reasons:
> * it's way too much work for most of us
> * it requires copying the secret key over, which is, uh, a bad idea.
>
> An alternative would be to copy over the .debs, si
No Cc was necessary, I am subscribed to debian-devel.
On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote:
> Scott James Remnant <[EMAIL PROTECTED]> writes:
>
> > A compromised dinstall on ftp-master could also replace the keyring
> > package with a new one containing an extra key, used to s
On Tue, 02 Dec 2003, Wouter Verhelst wrote:
> So unless you have a suggestion that would solve this particular issue,
> I'm afraid this idea won't work in practice.
We could verify if the gpg agent (gpa? I forget the name...) cannot do this
over a secure channel. It should be able to, and if not,
Goswin von Brederlow wrote:
> Joey Hess <[EMAIL PROTECTED]> writes:
> I submitted a one line patch to apt to fix this and behave like
> dpkg. I hope this gets added soon. Till then its either signed debs or
> pre-configuring of packages.
>>I filed bugs about this a long time ago, it is apparently
Joey Hess <[EMAIL PROTECTED]> wrote:
> Goswin von Brederlow wrote:
>> > dpkg that it is downgrading the package, and a clever attacker might
>> > avoid even that.
>> How would you avoid it?
> Make the replacement package really be a different package entirely, of
> a higher version than the packa
Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow:
[...]
> Deb signatures method C:
>
> And now for something completly different. A man with 3 noses. :)
>
> Instead of keeping extra files with the signature of the deb the
> information could be stored inside the deb itself.
[...]
As much
On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote:
> > A true IDS is needed, such as aide, tripwire, or cfengine to detect
> > post-installation intrusion. Tie in aide or tripwire database
> > checks/updates with the apt.conf "PostInst" option in addition to a
> > daily cronjon to e
Scripsit Goswin von Brederlow <[EMAIL PROTECTED]>
> There is no security as strong as many people reading the source over
> and over. You can't hack their brains to skip over the backdoor code
> and you can only obfuscate a backdoor so much.
I refer you to Ken Thompson's Turing award lecture. If
Goswin von Brederlow wrote:
> > dpkg that it is downgrading the package, and a clever attacker might
> > avoid even that.
>
> How would you avoid it?
Make the replacement package really be a different package entirely, of
a higher version than the package it purports to replace.
I think aj had s
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote:
> > The canoical attack against signed debs in this situation is to find a
> > signed deb on snapshot.debian.net that contains a known security hole.
>
> To avoid this attack, it is necessary that the filename of the deb or
> the versi
On Tue, Dec 02, 2003 at 02:20:43PM +0100, Goswin von Brederlow wrote:
> There is no security as strong as many people reading the source over
> and over. You can't hack their brains to skip over the backdoor code
> and you can only obfuscate a backdoor so much.
Allright, allright, I'll cry uncle.
Tom <[EMAIL PROTECTED]> writes:
> On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote:
>
> > Tom <[EMAIL PROTECTED]> writes:
> > > What precautions are taken that the DD actually signed it with the DD's
> > > private key?
> > > Set aside the possibility that the DD herself is ac
* Chad Walstrom <[EMAIL PROTECTED]> [031201 22:28]:
> md5sums and signatures are most useful in the context of installation.
> Post-installation, you cannot be guaranteed that an intrusion rootkit
> doesn't compromise the md5sum files themselves. Using the installed
> *.md5sum files to check the in
On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote:
> Tom <[EMAIL PROTECTED]> writes:
> > What precautions are taken that the DD actually signed it with the DD's
> > private key?
> > Set aside the possibility that the DD herself is actually the attacker.
>
> You never can. Bu
Tom <[EMAIL PROTECTED]> writes:
> On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote:
> > * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]:
> > > Goswin von Brederlow wrote:
> > > > What can we do with deb signatures?
> > > >
> > > > For our current problem, the integrity of the debian a
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]:
> > Goswin von Brederlow wrote:
> > > What can we do with deb signatures?
> > >
> > > For our current problem, the integrity of the debian archive being
> > > questioned, the procedure would be easy and av
Eduard Bloch <[EMAIL PROTECTED]> writes:
> Moin Goswin!
> Goswin von Brederlow schrieb am Tuesday, den 02. December 2003:
>
> > > I would like to see the following things happen:
> > >
> > > - current md5sums file in control.tar.gz should contain
> > >checksums of really all files
> > > -
Joey Hess <[EMAIL PROTECTED]> writes:
> John Goerzen wrote:
> > Please check out the debsigs package. I wrote it when I worked at
> > Progeny back in 2001, and Branden Robinson maintains it these days. It
> > does exactly that.
>
> Unfortunatly, the method debsigs uses to add the signature to t
Moin Goswin!
Goswin von Brederlow schrieb am Tuesday, den 02. December 2003:
> > I would like to see the following things happen:
> >
> > - current md5sums file in control.tar.gz should contain
> >checksums of really all files
> > - a signature of the md5sums file should be stored either in
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote:
> * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]:
> > Goswin von Brederlow wrote:
> > > What can we do with deb signatures?
> > >
> > > For our current problem, the integrity of the debian archive being
> > > questioned, the procedure
* Joey Hess ([EMAIL PROTECTED]) [031202 02:55]:
> Goswin von Brederlow wrote:
> > What can we do with deb signatures?
> >
> > For our current problem, the integrity of the debian archive being
> > questioned, the procedure would be easy and available to every user:
> >
> > 1. get any clean Debian
* Goswin von Brederlow ([EMAIL PROTECTED]) [031202 04:55]:
> Andreas Barth <[EMAIL PROTECTED]> writes:
> > Technical details should IMHO be discussed later, but a sample
> > passport could look like:
> >
> > accepted by katie on Mon, 1 Dec 2003 20:34:58 + because of good
> > signature of DD,
Martin Michlmayr ([EMAIL PROTECTED]) wrote:
>
>* Thomas Viehmann <[EMAIL PROTECTED]> [2003-12-01 15:30]:
>> BTW: This is offtopic, but it seems that potato is neither in debian/
>> nor in debian-archive/?
>Potato is on archive.debian.org (in /debian-archive/dists).
Ah. Thanks.
ftp.debian.org/debia
Goswin von Brederlow <[EMAIL PROTECTED]> writes:
> Thomas Viehmann <[EMAIL PROTECTED]> writes:
>
> > Hi.
> >
> > Goswin von Brederlow wrote:
> > > PS: I favour method C and would esspecially like some feedback on the
> > > technical aspect. Can a "_deb_signature" file be savely added to the
> >
Joey Hess <[EMAIL PROTECTED]> writes:
> Goswin von Brederlow wrote:
> > What can we do with deb signatures?
> >
> > For our current problem, the integrity of the debian archive being
> > questioned, the procedure would be easy and available to every user:
> >
> > 1. get any clean Debian keyring
On Tue, Dec 02, 2003 at 03:58:53AM +0100, Goswin von Brederlow wrote:
> John Goerzen <[EMAIL PROTECTED]> writes:
>
> PS: Does debsigs just sign the control and data file or all files in
> the ar? What if we add some more files at some point (like a
> _buildinfo)?
It cats the control and data file
Andreas Barth <[EMAIL PROTECTED]> writes:
> * Goswin von Brederlow ([EMAIL PROTECTED]) [031201 14:40]:
> > Instead of keeping extra files with the signature of the deb the
> > information could be stored inside the deb itself. Of cause the
> > signature can't be contained in the thing being signed
Scott James Remnant <[EMAIL PROTECTED]> writes:
> On Mon, 2003-12-01 at 13:34, Goswin von Brederlow wrote:
>
> > We have no continous trust chain going from the maintainer (also
> > meaning buildd + admin), ftp-master.d.o, mirrors to the user. A
> > compromised dinstall on master could replace bi
christophe barbe <[EMAIL PROTECTED]> writes:
> On Mon, Dec 01, 2003 at 09:11:52PM +0100, Andreas Barth wrote:
> > > Before mass bug-filling, it would be necessary to make it mandatory
> > > which unfortunately is not the case right now afaik.
> >
> > Severity: wishlist
> > Where is the problem?
Eduard Bloch <[EMAIL PROTECTED]> writes:
> #include
> John Goerzen schrieb am Monday, den 01. December 2003:
>
> > Debsigs generates its signature by effectively cating the control and
> > data components of the ar file together, running that through gpg, and
> > storing the resulting signature
1 - 100 of 128 matches
Mail list logo