Re: leaks in our only-signed-software fortress

2012-03-02 Thread Christoph Anton Mitterer
On Mon, 2012-02-20 at 19:50 -0500, Michael Gilbert wrote: > But anyway, I think to get anywhere you'll need to help get Debian > policy 2.2.1 clarified for these kind of conditions. Then you'll be > able to submit bugs with appropriate RC severity so they'll have to be > handled. Phew,.. changing

Re: leaks in our only-signed-software fortress

2012-03-02 Thread Christoph Anton Mitterer
On Tue, 2012-02-21 at 16:59 -0600, Gunnar Wolf wrote: > Sadly, I think this is more propaganda and wishful thinking than > reality. And if I'm going to badmouth somebody, I'll badmouth myself. I guess you're right, that for large software it's difficult to impossible for the maintainer to really f

Re: leaks in our only-signed-software fortress

2012-02-26 Thread Darren Salt
I demand that Toni Mueller may or may not have written... > On 02/18/2012 11:48 AM, Thomas Koch wrote: >> What about a debhelper script that receives an URL (or set of mirror >> URLs) and a SHA1 and does the download and check? > If you're going this way, try to peek at the *BSD's ports systems,

Re: leaks in our only-signed-software fortress

2012-02-22 Thread Henrique de Moraes Holschuh
On Tue, 21 Feb 2012, Gunnar Wolf wrote: > Henrique de Moraes Holschuh dijo [Sat, Feb 18, 2012 at 10:46:50AM -0200]: > > Good packaging developers go to great lengths to be sure they are not > > going to distribute anything trojaned. This takes a lot of work, and > > often requires very goot workin

Re: leaks in our only-signed-software fortress

2012-02-21 Thread Gunnar Wolf
Henrique de Moraes Holschuh dijo [Sat, Feb 18, 2012 at 10:46:50AM -0200]: > Good packaging developers go to great lengths to be sure they are not > going to distribute anything trojaned. This takes a lot of work, and > often requires very goot working relationship with upstream to the point > of g

Re: leaks in our only-signed-software fortress

2012-02-21 Thread Toni Mueller
On 02/18/2012 11:48 AM, Thomas Koch wrote: > What about a debhelper script that receives an URL (or set of mirror URLs) > and > a SHA1 and does the download and check? If you're going this way, try to peek at the *BSD's ports systems, specifically their 'distinfo' files. SHA1 is not enough, imho

Re: leaks in our only-signed-software fortress

2012-02-20 Thread Michael Gilbert
On Fri, Feb 17, 2012 at 11:09 PM, Christoph Anton Mitterer wrote: > For many of those I've reported bugs (and I'm sure I didn't found a lot of > them, and I'm further sure > that new cases were introduced). > Some where closed, some where just ignored or denied. Fortunately, this is rather uncommo

Re: leaks in our only-signed-software fortress

2012-02-20 Thread Christoph Anton Mitterer
On Mon, 2012-02-20 at 09:56 +, Philipp Kern wrote: > Well, the rationale is documented in #333552 (which is linked to by the > changelog). I dropped some words on "rationale" to the aforementioned bug,... > AIUI it doesn't matter because it's just about randomizing > unused parts of the packe

Re: leaks in our only-signed-software fortress

2012-02-20 Thread Philipp Kern
On 2012-02-20, Christoph Anton Mitterer wrote: > 2) Well I really feel bad now, having to point my finger at the Nagios > Maintainers as they really do a good job, but this just shocked me: > Bug #660585. > > Well as I describe in the bug, it is practically (at the moment) of no > relevance as SSL

Re: leaks in our only-signed-software fortress

2012-02-20 Thread Jon Dowland
On Sat, Feb 18, 2012 at 06:09:37AM +0200, Christoph Anton Mitterer wrote: > - packages that are just wrapper packages, download something from > somewhere without doing any > hashsum checks at all How many in main? -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subje

Re: leaks in our only-signed-software fortress

2012-02-19 Thread Christoph Anton Mitterer
Hey. Just by now,... two additional cases of security problems crossed my mind. Though not related to our package signing, they originate to some extent in the same problem as everything that was discussed in this thread before: Insufficient "feeling" for security [by maintainers]. 1) Silent mod

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Adam Borowski
On Sat, Feb 18, 2012 at 04:42:38PM -0200, Henrique de Moraes Holschuh wrote: > > Against what? The source is only downloaded from upstream once per > > upstream release, what is there to check against? > > Upstream VCS, previous releases (when the diff is small enough), request > that upstream pub

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Henrique de Moraes Holschuh
On Sat, 18 Feb 2012, Philip Hands wrote: > On Sat, 18 Feb 2012 15:49:30 +, Neil Williams wrote: > > On Sat, 18 Feb 2012 16:25:20 +0200 > > Christoph Anton Mitterer wrote: > > > Am 18.02.2012 14:40, schrieb Neil Williams: > > > >> I think as a start it should be made a policy that any "wrapper

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Henrique de Moraes Holschuh
On Sat, 18 Feb 2012, Neil Williams wrote: > On Sat, 18 Feb 2012 16:25:20 +0200 > Christoph Anton Mitterer wrote: > > Am 18.02.2012 14:40, schrieb Neil Williams: > > >> I think as a start it should be made a policy that any "wrapper" > > >> package that > > >> downloads code from the net must at l

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Thomas Goirand
On 02/18/2012 09:30 PM, Josselin Mouette wrote: > Plugin integrity is > guaranteed by SSL, and extensions have been checked before being put on > the website. > I feel much much safer now that I know that my plugin downloads are protected by Diginotar ! :) Thomas -- To UNSUBSCRIBE, email to

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Thomas Goirand
On 02/18/2012 08:40 PM, Neil Williams wrote: > On Sat, 18 Feb 2012 11:48:27 +0100 > Thomas Koch wrote: > > >> I think as a start it should be made a policy that any "wrapper" package >> that >> downloads code from the net must at least do a strong checksum check on the >> downloaded code. >>

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Roger Leigh
On Sat, Feb 18, 2012 at 04:31:19PM +0100, Ansgar Burchardt wrote: > Jakub Wilk writes: > > * Ansgar Burchardt , 2012-02-18, 14:14: > >>>Could you point us to those which were ignored or denied? > >>At least pbuilder still disables secure APT by default, see #579028. > > > > The bug is closed. Am I

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 18:45, schrieb Philip Hands: He's talking about stuff like flash-nonfree (or whatever) where we ship a wrapper that wgets the actual tarball for you from the distributor, and checks the checksum of whatever it ends up with. Yes! (perhaps if paranoid do the download from elsewher

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 19:03, schrieb brian m. carlson: On Sat, Feb 18, 2012 at 11:48:27AM +0100, Thomas Koch wrote: What about a debhelper script that receives an URL (or set of mirror URLs) and a SHA1 and does the download and check? Please use something stronger than SHA-1. SHA-1 has some weaknesses

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 16:18, schrieb Jakub Wilk: The bug is closed. Am I missing something? But anyway, this is saddening. Hundreds (? - wild guess) of developers have been building their packages in insecure environment, yet pbuilder maintainer and a member of Security Team believe that it was a featur

Re: leaks in our only-signed-software fortress

2012-02-18 Thread brian m. carlson
On Sat, Feb 18, 2012 at 11:48:27AM +0100, Thomas Koch wrote: > What about a debhelper script that receives an URL (or set of mirror > URLs) and a SHA1 and does the download and check? Please use something stronger than SHA-1. SHA-1 has some weaknesses and something like SHA-256 or SHA-512 should

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Philip Hands
On Sat, 18 Feb 2012 15:49:30 +, Neil Williams wrote: > On Sat, 18 Feb 2012 16:25:20 +0200 > Christoph Anton Mitterer wrote: > > > Am 18.02.2012 14:40, schrieb Neil Williams: > > >> I think as a start it should be made a policy that any "wrapper" > > >> package that > > >> downloads code fro

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Neil Williams
On Sat, 18 Feb 2012 15:59:38 +0200 Christoph Anton Mitterer wrote: > Am 18.02.2012 10:11, schrieb Teus Benschop: > > To put things in perspective, I just wonder how strong this > > 'fortress' > > really is, and whether this strength is only in our perception or > > whether it is real. Let me giv

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Neil Williams
On Sat, 18 Feb 2012 16:25:20 +0200 Christoph Anton Mitterer wrote: > Am 18.02.2012 14:40, schrieb Neil Williams: > >> I think as a start it should be made a policy that any "wrapper" > >> package that > >> downloads code from the net must at least do a strong checksum check > >> on the > >> dow

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Ansgar Burchardt
Jakub Wilk writes: > * Ansgar Burchardt , 2012-02-18, 14:14: >>>Could you point us to those which were ignored or denied? >>At least pbuilder still disables secure APT by default, see #579028. > > The bug is closed. Am I missing something? pbuilder was changed to pass the --keyring argument to de

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Jakub Wilk
* Christoph Anton Mitterer , 2012-02-18, 16:19: Take the non-free flash as example... (yeah I know it's non-free and not officially sec-supported).. Even if it would use some SHA512 sums (hardcoded into the package) to verify the download (I don't know whether it does),.. the update mechanism i

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 15:30, schrieb Josselin Mouette: Personally I decided to use GNOME-fallback, but via the meta-packages I still got the GNOME shell... today I've noticed that it silently installs an extension, which (I can only assume this by the little description) does some software installatio

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 14:40, schrieb Neil Williams: I think as a start it should be made a policy that any "wrapper" package that downloads code from the net must at least do a strong checksum check on the downloaded code. Not possible to enforce as a 'MUST' because, by definition, third-party websit

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 14:34, schrieb Neil Williams: >- packages that eventually run some code which was downloaded >unsecured. >debootstrap used to be like that, pbuilder, and some others Only a bug if this happens by default. It is perfectly acceptable to support an option to disable SecureApt - ju

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 13:32, schrieb Jakub Wilk: I'll add to the list: - Packages that download and run untrusted code at build time. May I add a similar case... Take the non-free flash as example... (yeah I know it's non-free and not officially sec-supported).. Even if it would use some SHA512 sums (h

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Jakub Wilk
* Ansgar Burchardt , 2012-02-18, 14:14: Could you point us to those which were ignored or denied? At least pbuilder still disables secure APT by default, see #579028. The bug is closed. Am I missing something? But anyway, this is saddening. Hundreds (? - wild guess) of developers have been b

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 13:14, schrieb Benjamin Drung: This is no problem for us, because the malware was distributed on some untrustworthy websites. We, as packagers, get the code directly from the Videolan project. So you meet them once in person and exchanged some kind of PKI/shared secret etc? Tha

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Christoph Anton Mitterer
Am 18.02.2012 10:11, schrieb Teus Benschop: To put things in perspective, I just wonder how strong this 'fortress' really is, and whether this strength is only in our perception or whether it is real. Let me give just one example: A developer downloads a tarball from an upstream source, configu

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Ansgar Burchardt
Jakub Wilk writes: > Could you point us to those which were ignored or denied? At least pbuilder still disables secure APT by default, see #579028. Regards Ansgar -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lis

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Josselin Mouette
Le samedi 18 février 2012 à 06:09 +0200, Christoph Anton Mitterer a écrit : > Personally I decided to use GNOME-fallback, but via the meta-packages I > still got the GNOME shell... today > I've noticed that it silently installs an extension, which (I can only > assume this by the little > descri

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Henrique de Moraes Holschuh
On Sat, 18 Feb 2012, Teus Benschop wrote: > To put things in perspective, I just wonder how strong this 'fortress' > really is, and whether this strength is only in our perception or > whether it is real. Let me give just one example: A developer downloads > a tarball from an upstream source, confi

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Neil Williams
On Sat, 18 Feb 2012 11:48:27 +0100 Thomas Koch wrote: > I think as a start it should be made a policy that any "wrapper" package that > downloads code from the net must at least do a strong checksum check on the > downloaded code. Not possible to enforce as a 'MUST' because, by definition, thi

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Neil Williams
On Sat, 18 Feb 2012 12:32:14 +0100 Jakub Wilk wrote: > * Christoph Anton Mitterer , 2012-02-18, 06:09: > >I've decided that I think it's important to CC this d-d: > >Debian has a good system of securing packages and making sure that only > >signed stuff comes to the user. > >Over time I've seen

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Jakub Wilk
* Christoph Anton Mitterer , 2012-02-18, 06:09: I've decided that I think it's important to CC this d-d: Debian has a good system of securing packages and making sure that only signed stuff comes to the user. Over time I've seen many holes in this: - packages that are just wrapper packages, dow

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Benjamin Drung
Am Samstag, den 18.02.2012, 11:48 +0100 schrieb Thomas Koch: > July 2011 VLC suffers from Companies spreading Malware bundled with VLC This is no problem for us, because the malware was distributed on some untrustworthy websites. We, as packagers, get the code directly from the Videolan projec

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Thomas Koch
Christoph Anton Mitterer: > Hey. > > I've decided that I think it's important to CC this d-d: > Debian has a good system of securing packages and making sure that only > signed stuff comes to the user. > Over time I've seen many holes in this: > - packages that are just wrapper packages, download

Re: leaks in our only-signed-software fortress

2012-02-18 Thread Teus Benschop
To put things in perspective, I just wonder how strong this 'fortress' really is, and whether this strength is only in our perception or whether it is real. Let me give just one example: A developer downloads a tarball from an upstream source, configures it, and does make install, yet has not even

leaks in our only-signed-software fortress

2012-02-17 Thread Christoph Anton Mitterer
Hey. I've decided that I think it's important to CC this d-d: Debian has a good system of securing packages and making sure that only signed stuff comes to the user. Over time I've seen many holes in this: - packages that are just wrapper packages, download something from somewhere without doi