Re: Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Andreas Barth
* Julian Mehnle ([EMAIL PROTECTED]) [031210 13:40]: > Joey Hess <[EMAIL PROTECTED]> wrote: > > Goswin von Brederlow wrote: > > > What can we do with deb signatures? > > > > > > For our current problem, the integrity of the debian archive being > > > questioned, the procedure would be easy and avail

Re: Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Goswin von Brederlow
"Julian Mehnle" <[EMAIL PROTECTED]> writes: > Joey Hess <[EMAIL PROTECTED]> wrote: > > Goswin von Brederlow wrote: > > > What can we do with deb signatures? > > > > > > For our current problem, the integrity of the debian archive being > > > questioned, the procedure would be easy and available to

Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Julian Mehnle
Joey Hess <[EMAIL PROTECTED]> wrote: > Goswin von Brederlow wrote: > > What can we do with deb signatures? > > > > For our current problem, the integrity of the debian archive being > > questioned, the procedure would be easy and available to every user: > > > > 1. get any clean Debian keyring (or

Re: Revival of the signed debs discussion

2003-12-07 Thread Anthony DeRobertis
On Fri, 2003-12-05 at 22:46, Goswin von Brederlow wrote: > > No it isn't. For it to be non-repudiable, you'd have to demonstrate that > > the key has not been compromised; that the developer knew what he was > > signing (as opposed to a trojaned gpg telling him one thing while doing > > another);

Re: Revival of the signed debs discussion

2003-12-06 Thread Goswin von Brederlow
Henning Makholm <[EMAIL PROTECTED]> writes: > Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > > > If a package is compromised we can proof that the DD of the package > > either is malicious or incompetent. > > Say, we just had a major compromise on certain Debian machines. Pray > tell, who d

Re: Revival of the signed debs discussion

2003-12-06 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]: > > Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > > > If a package is compromised we can proof that the DD of the package > > > either is malicious or incompetent. > > > Say, we just had a maj

Re: Revival of the signed debs discussion

2003-12-06 Thread Andreas Barth
* Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]: > Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > > If a package is compromised we can proof that the DD of the package > > either is malicious or incompetent. > Say, we just had a major compromise on certain Debian machines. Pray > tell,

Re: Revival of the signed debs discussion

2003-12-06 Thread Henning Makholm
Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > If a package is compromised we can proof that the DD of the package > either is malicious or incompetent. Say, we just had a major compromise on certain Debian machines. Pray tell, who do you think this proves is malicious or incompetent? We'd c

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Anthony DeRobertis <[EMAIL PROTECTED]> writes: > On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote: > > > > The only one which comes to mind is a rogue Debian developer that > > > you do not wish to trust, even though the project trusts him. > > > > Not quite. The signed deb is non-repudia

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman <[EMAIL PROTECTED]> writes: > On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote: > > > Matt Zimmerman <[EMAIL PROTECTED]> writes: > > > > > Release signing protects against a hostile or compromised mirror, > > > network, DNS server, proxy server, and a host of o

Re: Revival of the signed debs discussion

2003-12-05 Thread Anthony DeRobertis
On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote: > > The only one which comes to mind is a rogue Debian developer that > > you do not wish to trust, even though the project trusts him. > > Not quite. The signed deb is non-repudiable authorship -- nice > to know whence the software come

Re: Revival of the signed debs discussion

2003-12-05 Thread Matt Zimmerman
On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote: > Matt Zimmerman <[EMAIL PROTECTED]> writes: > > > Release signing protects against a hostile or compromised mirror, > > network, DNS server, proxy server, and a host of other, similar attacks, > > and also prevents most forms

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman <[EMAIL PROTECTED]> writes: > On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote: > > > Signed debs establish a trust chain from the buildd to the user and > > from the buildd-admin/maintainer to the user as well as copy the > > existing trust chain from ftp-maste

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman <[EMAIL PROTECTED]> writes: > On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote: > > > I wrote a little script that checks what apt things its installing > > against what the control files of the debs say. I will test it with > > some more fakes and then file it

Re: Revival of the signed debs discussion

2003-12-05 Thread Manoj Srivastava
On Thu, 4 Dec 2003 14:41:43 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said: > On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: >> On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> >> said: >> >> > What kind of real world attacks do signed debs prevent? Not a

Re: Revival of the signed debs discussion

2003-12-05 Thread Andreas Barth
* Matt Zimmerman ([EMAIL PROTECTED]) [031204 22:25]: > On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote: > > On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: > > > What kind of real world attacks do signed debs prevent? > > > > > > The only one which comes to mind i

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote: > I wrote a little script that checks what apt things its installing > against what the control files of the debs say. I will test it with > some more fakes and then file it in the BTS. Why would you do this with a script rathe

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote: > On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: > > What kind of real world attacks do signed debs prevent? > > > > The only one which comes to mind is a rogue Debian developer that you do > > not wish to trust,

Re: Revival of the signed debs discussion

2003-12-04 Thread Daniel Jacobowitz
On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: > On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: > > > On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said: > > > > > What kind of real world attacks do signed debs prevent? Not a > > > com

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: > On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said: > > > What kind of real world attacks do signed debs prevent? Not a > > compromised buildd, or a compromised maintainer's workstation. > > It wo

Re: Revival of the signed debs discussion

2003-12-04 Thread Manoj Srivastava
On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman <[EMAIL PROTECTED]> said: > What kind of real world attacks do signed debs prevent? Not a > compromised buildd, or a compromised maintainer's workstation. It would allow me to copy .debs around with other people, or use .debs not made a

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote: > Signed debs establish a trust chain from the buildd to the user and > from the buildd-admin/maintainer to the user as well as copy the > existing trust chain from ftp-master to the user into the deb itself. > > The Release.gp

Re: Revival of the signed debs discussion

2003-12-04 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]: > > Andreas Barth <[EMAIL PROTECTED]> writes: > > > > Ok? > > > Sounds ok but the upload rules can be tightened much much later. First > > we have to get signing started, which means fixing ap

Re: Revival of the signed debs discussion

2003-12-04 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]: > Andreas Barth <[EMAIL PROTECTED]> writes: > > Ok? > Sounds ok but the upload rules can be tightened much much later. First > we have to get signing started, which means fixing apt-utils or > debsigs or preferably both. And of cause cha

Re: Revival of the signed debs discussion

2003-12-04 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]: > > Op wo 03-12-2003, om 10:09 schreef Andreas Barth: > > > > > file back signed by the build admin. The debian archive scripts > > > > > accepts packages signed by a buildd-key only if it is a binary

Re: Revival of the signed debs discussion

2003-12-04 Thread Andreas Barth
* Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]: > Op wo 03-12-2003, om 10:09 schreef Andreas Barth: > > > > file back signed by the build admin. The debian archive scripts > > > > accepts packages signed by a buildd-key only if it is a binary package > > > > for this architecture, the key is

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matt Zimmerman <[EMAIL PROTECTED]> writes: > On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote: > > > Matt Zimmerman <[EMAIL PROTECTED]> writes: > > > > > On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: > > > > > > > But this kind of tampering _can_ be c

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Wouter Verhelst <[EMAIL PROTECTED]> writes: > Op wo 03-12-2003, om 10:09 schreef Andreas Barth: > > > > file back signed by the build admin. The debian archive scripts > > > > accepts packages signed by a buildd-key only if it is a binary package > > > > for this architecture, the key is valid (i.

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
Op wo 03-12-2003, om 10:09 schreef Andreas Barth: > > > file back signed by the build admin. The debian archive scripts > > > accepts packages signed by a buildd-key only if it is a binary package > > > for this architecture, the key is valid (i.e. in the right year), and > > > this package has bee

Re: Revival of the signed debs discussion

2003-12-03 Thread Werner Koch
On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said: > I'm also a bit concerned about MitM attacks; the hash-or-whatever which Obviously you can do this only using a secure channel. > the local side is supposed to sign should probably be encrypted with the > signer's public key, otherwise I

Re: Revival of the signed debs discussion

2003-12-03 Thread Werner Koch
On Wed, 3 Dec 2003 12:08:10 +0100, Matthias Urlichs said: >> signature algorithm would allow for hashing the data on the remote >> machine, and signing that hash locally. >> > ... that would work. It'd probably require a few hooks within GPG > to generate a hash packet / . Since I moved my actua

Re: Revival of the signed debs discussion

2003-12-03 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote: > Matt Zimmerman <[EMAIL PROTECTED]> writes: > > > On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: > > > > > But this kind of tampering _can_ be checked by apt before installing > > > the deb simply by ad

Re: Revival of the signed debs discussion

2003-12-03 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:25]: > Henning Makholm <[EMAIL PROTECTED]> writes: > > If an attacker compromises the buildd to the point where he can gain > > access to its secret key, he could just as well attack its build > > environment, or simply use his access to convinc

Re: Revival of the signed debs discussion

2003-12-03 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:40]: > Andreas Barth <[EMAIL PROTECTED]> writes: > > * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: > > > So unless you have a suggestion that would solve this particular issue, > > > I'm afraid this idea won't work in practice. > > Two

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, Werner Koch: > On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said: > > the local side is supposed to sign should probably be encrypted with the > > signer's public key, otherwise I can just replace the data packet with > > something that ends up signing a totally different file. :-/ > >

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matthias Urlichs <[EMAIL PROTECTED]> writes: > Hi, > > Werner Koch: > > There are some minor problems because we don't just sign a hash but > > need to add some more data. Creating an incomplete hash on the remote > > machine is not the cleanest solution, so I have to come up with a > > better w

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Wouter Verhelst <[EMAIL PROTECTED]> writes: > On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: > > Hi, Henrique de Moraes Holschuh wrote: > > > > > On Tue, 02 Dec 2003, Wouter Verhelst wrote: > > >> So unless you have a suggestion that would solve this particular issue, > > >> I'

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, Werner Koch: > There are some minor problems because we don't just sign a hash but > need to add some more data. Creating an incomplete hash on the remote > machine is not the cleanest solution, so I have to come up with a > better way. > You're the GPG expert... I'm also a bit concerned a

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-03 Thread Bernhard R. Link
* Chad Walstrom <[EMAIL PROTECTED]> [031202 18:14]: > I'm not following your logic, if that's what you call it. You're saying > that checking the current filesystem on a daily basis is NOT a good way > to verify filesystem integrity? I say it won't give you an real advantage over checking the *.m

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 12:08:10PM +0100, Matthias Urlichs wrote: > Wouter Verhelst: > > Especially in the case of larger .debs, that would probably reduce the > > actual signature size as well... > > ?? A hash is a hash, and should be independent of file size. Obviously, sorry. I don't know how

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, [ I'm Cc-ing Werner Koch on this ] Wouter Verhelst: > On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: > > Hi, Henrique de Moraes Holschuh wrote: > > > > > On Tue, 02 Dec 2003, Wouter Verhelst wrote: > > >> So unless you have a suggestion that would solve this particular iss

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote: > Bernd Eckenfels <[EMAIL PROTECTED]> writes: > > How often has this person glance over the results? As I understand debian > > build daemons run unattended and build continously. Correct me when I am > > wrong here. > > > > Bu

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: > Hi, Henrique de Moraes Holschuh wrote: > > > On Tue, 02 Dec 2003, Wouter Verhelst wrote: > >> So unless you have a suggestion that would solve this particular issue, > >> I'm afraid this idea won't work in practice. > > > > We co

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: > On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: > > Joey Hess <[EMAIL PROTECTED]> wrote: > > > Goswin von Brederlow wrote: > > >> > dpkg that it is downgrading the package, and a clever attacker might > > >> > avoid

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matt Zimmerman <[EMAIL PROTECTED]> writes: > On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: > > > But this kind of tampering _can_ be checked by apt before installing > > the deb simply by adding a signature verifyer into the > > DPkg::Pre-Install-Pkgs config option, the sa

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Bernd Eckenfels <[EMAIL PROTECTED]> writes: > On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote: > > What the admins signature can gives us is a trusted timestamp and > > another pair of eyes reading the changes files. > > Well, a trusted timestamp can be added/required by a th

Re: Revival of the signed debs discussion

2003-12-03 Thread Anthony Towns
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: > You change the contents of the compromised Packages file, so that > Package: bash > is accompanied by > Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb > which contains a perfectly valid .deb file, signed by a DD,

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Anthony Towns writes: > On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: > > You change the contents of the compromised Packages file, so that > > Package: bash > > is accompanied by > > Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb > > which contains a perfect

Re: Revival of the signed debs discussion

2003-12-03 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote: [TSP] > If there is no person sitting there signing it manually its useless. Why is that? I trust an automated service to provide me signed timestamps. In fact a Box doing exactly this and nothing else can be very securely lock

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Scott James Remnant <[EMAIL PROTECTED]> writes: > On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote: > > > Scott James Remnant <[EMAIL PROTECTED]> writes: > > > > > No Cc was necessary, I am subscribed to debian-devel. > > > > > > I can only assume you ignored this out of either spite or

Re: Revival of the signed debs discussion

2003-12-02 Thread Scott James Remnant
On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote: > Scott James Remnant <[EMAIL PROTECTED]> writes: > > > No Cc was necessary, I am subscribed to debian-devel. > > > I can only assume you ignored this out of either spite or stupidity. I don't mind too much if people forget the code of c

Re: Revival of the signed debs discussion

2003-12-02 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: > But this kind of tampering _can_ be checked by apt before installing > the deb simply by adding a signature verifyer into the > DPkg::Pre-Install-Pkgs config option, the same mechanism > apt-listchanges already uses to display

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm <[EMAIL PROTECTED]> writes: > Scripsit Goswin von Brederlow > > Henning Makholm <[EMAIL PROTECTED]> writes: > > > > I refer you to Ken Thompson's Turing award lecture. If someone who > > > really means business manages to compromise binary toolchain debs, all > > > the hackers in

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: > > So unless you have a suggestion that would solve this particular issue, > > I'm afraid this idea won't work in practice. > > Two suggestions come to my mind. However, I can't judge how useful > t

Re: Revival of the signed debs discussion

2003-12-02 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote: > What the admins signature can gives us is a trusted timestamp and > another pair of eyes reading the changes files. Well, a trusted timestamp can be added/required by a third party. No need to bother a build admin with signing

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm <[EMAIL PROTECTED]> writes: > Scripsit Wouter Verhelst <[EMAIL PROTECTED]> > > > Requiring us to log in to the autobuilder to sign the .deb remotely is > > not acceptable, for two reasons: > > * it's way too much work for most of us > > * it requires copying the secret key over, w

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Joey Hess <[EMAIL PROTECTED]> writes: > Andreas Metzler wrote: > > I still don't understand how you change the version number (or the > > package-name) without breaking the signature. > > Which signature? The Packages file is being modified, so of course the > hain of trust back to the Release fi

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Scott James Remnant <[EMAIL PROTECTED]> writes: > No Cc was necessary, I am subscribed to debian-devel. > > On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote: > > > Scott James Remnant <[EMAIL PROTECTED]> writes: > > > > > A compromised dinstall on ftp-master could also replace the keyrin

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Goswin von Brederlow
Chad Walstrom <[EMAIL PROTECTED]> writes: > On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote: > > > A true IDS is needed, such as aide, tripwire, or cfengine to detect > > > post-installation intrusion. Tie in aide or tripwire database > > > checks/updates with the apt.conf "PostI

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Metzler <[EMAIL PROTECTED]> writes: > Joey Hess <[EMAIL PROTECTED]> wrote: > > Goswin von Brederlow wrote: > >> > dpkg that it is downgrading the package, and a clever attacker might > >> > avoid even that. > > >> How would you avoid it? > > > Make the replacement package really be a dif

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Wouter Verhelst <[EMAIL PROTECTED]> writes: > Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow: > [...] > > Deb signatures method C: > > > > And now for something completly different. A man with 3 noses. :) > > > > Instead of keeping extra files with the signature of the deb the > > infor

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Goswin von Brederlow > Henning Makholm <[EMAIL PROTECTED]> writes: > > I refer you to Ken Thompson's Turing award lecture. If someone who > > really means business manages to compromise binary toolchain debs, all > > the hackers in the world reading source over and over will not find > >

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Metzler
Steve Langasek <[EMAIL PROTECTED]> wrote: > On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: >> Joey Hess <[EMAIL PROTECTED]> wrote: >> > Goswin von Brederlow wrote: >> >> > dpkg that it is downgrading the package, and a clever attacker might >> >> > avoid even that. >> >> How woul

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm <[EMAIL PROTECTED]> writes: > Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > > > There is no security as strong as many people reading the source over > > and over. You can't hack their brains to skip over the backdoor code > > and you can only obfuscate a backdoor so much. >

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Steve Langasek ([EMAIL PROTECTED]) [031202 22:10]: > AFAIK, apt does not sanity check the relationship between package names > and filenames (and it's not obvious that this should be part of its > responsibilities), and dpkg only gets a list of .debs to install once > they've been downloaded. So

Re: Revival of the signed debs discussion

2003-12-02 Thread Matthias Urlichs
Hi, Henrique de Moraes Holschuh wrote: > On Tue, 02 Dec 2003, Wouter Verhelst wrote: >> So unless you have a suggestion that would solve this particular issue, >> I'm afraid this idea won't work in practice. > > We could verify if the gpg agent (gpa? I forget the name...) cannot do this > over a

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: > As much as I like this idea in principle, storing signatures inside > .debs has a serious problem: it won't work for us buildd maintainers. Workability for the buildd maintainers is IMHO _certainly_ one important thing. > As I explain in my

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Wouter Verhelst <[EMAIL PROTECTED]> > Requiring us to log in to the autobuilder to sign the .deb remotely is > not acceptable, for two reasons: > * it's way too much work for most of us > * it requires copying the secret key over, which is, uh, a bad idea. Um, perhaps this is really stup

Re: Revival of the signed debs discussion

2003-12-02 Thread Steve Langasek
On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: > Joey Hess <[EMAIL PROTECTED]> wrote: > > Goswin von Brederlow wrote: > >> > dpkg that it is downgrading the package, and a clever attacker might > >> > avoid even that. > >> How would you avoid it? > > Make the replacement package

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Andreas Metzler wrote: > I still don't understand how you change the version number (or the > package-name) without breaking the signature. Which signature? The Packages file is being modified, so of course the hain of trust back to the Release file signature can be used to catch tampering with it

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Wouter Verhelst wrote: > Requiring us to log in to the autobuilder to sign the .deb remotely is > not acceptable, for two reasons: > * it's way too much work for most of us > * it requires copying the secret key over, which is, uh, a bad idea. > > An alternative would be to copy over the .debs, si

Re: Revival of the signed debs discussion

2003-12-02 Thread Scott James Remnant
No Cc was necessary, I am subscribed to debian-devel. On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote: > Scott James Remnant <[EMAIL PROTECTED]> writes: > > > A compromised dinstall on ftp-master could also replace the keyring > > package with a new one containing an extra key, used to s

Re: Revival of the signed debs discussion

2003-12-02 Thread Henrique de Moraes Holschuh
On Tue, 02 Dec 2003, Wouter Verhelst wrote: > So unless you have a suggestion that would solve this particular issue, > I'm afraid this idea won't work in practice. We could verify if the gpg agent (gpa? I forget the name...) cannot do this over a secure channel. It should be able to, and if not,

Re: Revival of the signed debs discussion

2003-12-02 Thread Thomas Viehmann
Goswin von Brederlow wrote: > Joey Hess <[EMAIL PROTECTED]> writes: > I submitted a one line patch to apt to fix this and behave like > dpkg. I hope this gets added soon. Till then its either signed debs or > pre-configuring of packages. >>I filed bugs about this a long time ago, it is apparently

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Metzler
Joey Hess <[EMAIL PROTECTED]> wrote: > Goswin von Brederlow wrote: >> > dpkg that it is downgrading the package, and a clever attacker might >> > avoid even that. >> How would you avoid it? > Make the replacement package really be a different package entirely, of > a higher version than the packa

Re: Revival of the signed debs discussion

2003-12-02 Thread Wouter Verhelst
Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow: [...] > Deb signatures method C: > > And now for something completly different. A man with 3 noses. :) > > Instead of keeping extra files with the signature of the deb the > information could be stored inside the deb itself. [...] As much

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Chad Walstrom
On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote: > > A true IDS is needed, such as aide, tripwire, or cfengine to detect > > post-installation intrusion. Tie in aide or tripwire database > > checks/updates with the apt.conf "PostInst" option in addition to a > > daily cronjon to e

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Goswin von Brederlow <[EMAIL PROTECTED]> > There is no security as strong as many people reading the source over > and over. You can't hack their brains to skip over the backdoor code > and you can only obfuscate a backdoor so much. I refer you to Ken Thompson's Turing award lecture. If

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Goswin von Brederlow wrote: > > dpkg that it is downgrading the package, and a clever attacker might > > avoid even that. > > How would you avoid it? Make the replacement package really be a different package entirely, of a higher version than the package it purports to replace. I think aj had s

Re: Revival of the signed debs discussion

2003-12-02 Thread John Goerzen
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: > > The canoical attack against signed debs in this situation is to find a > > signed deb on snapshot.debian.net that contains a known security hole. > > To avoid this attack, it is necessary that the filename of the deb or > the versi

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 02:20:43PM +0100, Goswin von Brederlow wrote: > There is no security as strong as many people reading the source over > and over. You can't hack their brains to skip over the backdoor code > and you can only obfuscate a backdoor so much. Allright, allright, I'll cry uncle.

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Tom <[EMAIL PROTECTED]> writes: > On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote: > > > Tom <[EMAIL PROTECTED]> writes: > > > What precautions are taken that the DD actually signed it with the DD's > > > private key? > > > Set aside the possibility that the DD herself is ac

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Bernhard R. Link
* Chad Walstrom <[EMAIL PROTECTED]> [031201 22:28]: > md5sums and signatures are most useful in the context of installation. > Post-installation, you cannot be guaranteed that an intrusion rootkit > doesn't compromise the md5sum files themselves. Using the installed > *.md5sum files to check the in

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote: > Tom <[EMAIL PROTECTED]> writes: > > What precautions are taken that the DD actually signed it with the DD's > > private key? > > Set aside the possibility that the DD herself is actually the attacker. > > You never can. Bu

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Tom <[EMAIL PROTECTED]> writes: > On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: > > * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: > > > Goswin von Brederlow wrote: > > > > What can we do with deb signatures? > > > > > > > > For our current problem, the integrity of the debian a

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: > > Goswin von Brederlow wrote: > > > What can we do with deb signatures? > > > > > > For our current problem, the integrity of the debian archive being > > > questioned, the procedure would be easy and av

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Goswin von Brederlow
Eduard Bloch <[EMAIL PROTECTED]> writes: > Moin Goswin! > Goswin von Brederlow schrieb am Tuesday, den 02. December 2003: > > > > I would like to see the following things happen: > > > > > > - current md5sums file in control.tar.gz should contain > > >checksums of really all files > > > -

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Joey Hess <[EMAIL PROTECTED]> writes: > John Goerzen wrote: > > Please check out the debsigs package. I wrote it when I worked at > > Progeny back in 2001, and Branden Robinson maintains it these days. It > > does exactly that. > > Unfortunatly, the method debsigs uses to add the signature to t

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Eduard Bloch
Moin Goswin! Goswin von Brederlow schrieb am Tuesday, den 02. December 2003: > > I would like to see the following things happen: > > > > - current md5sums file in control.tar.gz should contain > >checksums of really all files > > - a signature of the md5sums file should be stored either in

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: > * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: > > Goswin von Brederlow wrote: > > > What can we do with deb signatures? > > > > > > For our current problem, the integrity of the debian archive being > > > questioned, the procedure

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: > Goswin von Brederlow wrote: > > What can we do with deb signatures? > > > > For our current problem, the integrity of the debian archive being > > questioned, the procedure would be easy and available to every user: > > > > 1. get any clean Debian

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031202 04:55]: > Andreas Barth <[EMAIL PROTECTED]> writes: > > Technical details should IMHO be discussed later, but a sample > > passport could look like: > > > > accepted by katie on Mon, 1 Dec 2003 20:34:58 + because of good > > signature of DD,

Re: Revival of the signed debs discussion

2003-12-02 Thread Thomas Viehmann
Martin Michlmayr ([EMAIL PROTECTED]) wrote: > >* Thomas Viehmann <[EMAIL PROTECTED]> [2003-12-01 15:30]: >> BTW: This is offtopic, but it seems that potato is neither in debian/ >> nor in debian-archive/? >Potato is on archive.debian.org (in /debian-archive/dists). Ah. Thanks. ftp.debian.org/debia

Re: Revival of the signed debs discussion

2003-12-01 Thread Goswin von Brederlow
Goswin von Brederlow <[EMAIL PROTECTED]> writes: > Thomas Viehmann <[EMAIL PROTECTED]> writes: > > > Hi. > > > > Goswin von Brederlow wrote: > > > PS: I favour method C and would esspecially like some feedback on the > > > technical aspect. Can a "_deb_signature" file be savely added to the > >

Re: Revival of the signed debs discussion

2003-12-01 Thread Goswin von Brederlow
Joey Hess <[EMAIL PROTECTED]> writes: > Goswin von Brederlow wrote: > > What can we do with deb signatures? > > > > For our current problem, the integrity of the debian archive being > > questioned, the procedure would be easy and available to every user: > > > > 1. get any clean Debian keyring

Re: Revival of the signed debs discussion

2003-12-01 Thread John Goerzen
On Tue, Dec 02, 2003 at 03:58:53AM +0100, Goswin von Brederlow wrote: > John Goerzen <[EMAIL PROTECTED]> writes: > > PS: Does debsigs just sign the control and data file or all files in > the ar? What if we add some more files at some point (like a > _buildinfo)? It cats the control and data file

Re: Revival of the signed debs discussion

2003-12-01 Thread Goswin von Brederlow
Andreas Barth <[EMAIL PROTECTED]> writes: > * Goswin von Brederlow ([EMAIL PROTECTED]) [031201 14:40]: > > Instead of keeping extra files with the signature of the deb the > > information could be stored inside the deb itself. Of cause the > > signature can't be contained in the thing being signed

Re: Revival of the signed debs discussion

2003-12-01 Thread Goswin von Brederlow
Scott James Remnant <[EMAIL PROTECTED]> writes: > On Mon, 2003-12-01 at 13:34, Goswin von Brederlow wrote: > > > We have no continous trust chain going from the maintainer (also > > meaning buildd + admin), ftp-master.d.o, mirrors to the user. A > > compromised dinstall on master could replace bi

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-01 Thread Goswin von Brederlow
christophe barbe <[EMAIL PROTECTED]> writes: > On Mon, Dec 01, 2003 at 09:11:52PM +0100, Andreas Barth wrote: > > > Before mass bug-filling, it would be necessary to make it mandatory > > > which unfortunately is not the case right now afaik. > > > > Severity: wishlist > > Where is the problem?

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-01 Thread Goswin von Brederlow
Eduard Bloch <[EMAIL PROTECTED]> writes: > #include > John Goerzen schrieb am Monday, den 01. December 2003: > > > Debsigs generates its signature by effectively cating the control and > > data components of the ar file together, running that through gpg, and > > storing the resulting signature

  1   2   >