Torrent tracker problem

2014-07-14 Thread Kitty Cat
These torrents are not working with the Debian tracker.

http://cdimage.debian.org/debian-cd/7.6.0/source/bt-cd/debian-update-7.6.0-source-CD-1.iso.torrent

http://cdimage.debian.org/debian-cd/7.6.0/source/bt-cd/debian-update-7.6.0-source-CD-2.iso.torrent


Torrent Editor and also my Torrent software says that the tracker has not
seen these torrents and is not working with them. Check for yourself at
these links:

http://torrenteditor.com/edit.php?url=http%3A%2F%2Fcdimage.debian.org%2Fdebian-cd%2F7.6.0%2Fsource%2Fbt-cd%2Fdebian-update-7.6.0-source-CD-1.iso.torrent

http://torrenteditor.com/edit.php?url=http%3A%2F%2Fcdimage.debian.org%2Fdebian-cd%2F7.6.0%2Fsource%2Fbt-cd%2Fdebian-update-7.6.0-source-CD-2.iso.torrent


I am only seeding the i386, amd-64, powerpc and source media ISO's. Not
sure if there are problems with other media.


Re: concrete steps for improving apt downloading security and privacy

2014-07-10 Thread Kitty Cat
Thanks, but if you will notice, I have that link already listed at the
bottom of my message.

Also, you should not respond directly to people unless they specifically
ask you to do so. I did not ask.


On Wed, Jul 9, 2014 at 11:52 PM, Reid Sutherland r...@vianet.ca wrote:

 https://www.debian.org/

 Go to CD ISO Images, then Verify.



 On Jul 10, 2014, at 12:24 AM, Kitty Cat realizar.la@gmail.com wrote:

  Thanks.
 
  I'm new here. I was not on this list then. However, I just read the
 thread:
 
  https://lists.debian.org/debian-security/2011/01/msg2.html
 
  I saw that some of my concerns were mentioned there about obtaining and
 verifying installation media, MITM attacks, etc.
 
  I have previously verified installation media via the methods described
 in the FAQ, downloading GPG keys, etc. and still
  had an issue of having aptitude telling me that all available packages
 are from untrusted sources. (This was some years
  ago when I had this issue)
 
  I seem to remember being offered security updates for the kernel,
 OpenSSL, SSH, etc. where my only option was to download
  untrusted packages. I would get warning messages from aptitude about
 installing security updates.
 
  Maybe there should be written a document that describes in detail in
 easy to understand language what steps to take to
  verify keys and verify that apt has not been compromised in an already
 installed system. And also verifying that GPG has not
  been compromised.
 
  It is the job of the NSA to be able to compromise systems. We should
 make that task as difficult as possible at every level
  and also be able to easily verify that our system has not been corrupted.
 
  I think having a good guide to checking your installed Debian system
 would be of use. Particularly useful would be instructions
  to check to see if your system has been compromised by validating all
 already installed packages. MS Windows has an option
  to check installed Windows components.
 
 
  Some relevant links that I have previously discovered:
 
  https://wiki.debian.org/Keysigning
  https://wiki.debian.org/Keysigning/Coordination
  http://www.debian.org/CD/verify
  http://www.debian.org/CD/faq/#verify
 
 
  On Wed, Jul 9, 2014 at 8:11 PM, Michael Stone mst...@debian.org wrote:
  On Wed, Jul 09, 2014 at 06:29:09PM -0600, Kitty Cat wrote:
  For years I have been concerned with MITM attacks on Debian mirrors.
 
  We discussed this literally within the past couple of months on this
 list, at length. Have you read the archives, including the posts about how
 to establish a trust path to the ISOs?
 
  Mike Stone
 
 
 
  --
  To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
  with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
  Archive: https://lists.debian.org/20140710021124.ga27...@mathom.us
 
 




Re: concrete steps for improving apt downloading security and privacy

2014-07-09 Thread Kitty Cat
For years I have been concerned with MITM attacks on Debian mirrors.

I think the only valid solution would be to individually sign EACH package
with a valid GPG
signature from a trusted source.

I think EACH official package from Debian should be GPG signed by both
package maintainers and
also signed by official Debian release people.

For example... What is secure about this download link?

http://cdimage.debian.org/debian-cd/7.5.0/i386/iso-cd/debian-7.5.0-i386-netinst.iso

Sure I can also download and check the signatures from here:

http://cdimage.debian.org/debian-cd/7.5.0/i386/iso-cd/

However, what if http://cdimage.debian.org/ is actually an NSA mirror site
and not the real one?

Lets say that I want download anything from http://cdimage.debian.org/
http://cdimage.debian.org/debian-cd/7.5.0/amd64/iso-cd/

My downloader resolves http://cdimage.debian.org/
http://cdimage.debian.org/debian-cd/7.5.0/amd64/iso-cd/ to NSA mirror
site through DNS cache poisoning
or some other means. So, whatever I am downloading is already compromised.
All signatures are valid
but are from the NSA.

So there is no way for me to actually check that I have downloaded valid
files if everything that I see is
actually faked!

If I go edit apt sources list and manage to get an actual real Debian
server update, then apt tells me that
all packages available to download are security compromised.

Or lets say that I get a real install ISO disc and then later on my apt
mirror site is redirected to NSA mirror.
Apt will tell me that all packages available to download are security
compromised.

One of the two scenarios above has actually happened to me!!! I don't know
if it is actually the NSA but it
DID happen to me. Aptitude was telling me that every single package
available for download was compromised!

Think about this for a minute. If my ISP or upstream provider is secretly
cooperating with the NSA and the
NSA wants to compromise my machine, they can make it so that everything
that I download is through an
NSA source!

*Remember, the NSA can create VALID SSL certificates for any website on the
fly.*

Your web browser trusts many certificate authorities and which ones are
cooperating with the NSA?

So how can we really be sure that our Debian install has not been
compromised from the beginning?







On Thu, Jul 3, 2014 at 8:44 PM, Hans-Christoph Steiner h...@at.or.at
wrote:


 After the latest revelation about NSA tracking all Tor downloads[1] (with
 source code!) and the whole Debian mirrors and MITM redux, I think we
 should
 start talking about concrete steps that we can take to improve the
 situation.

 The first things that came to mind would be quite easy to do:

 * include apt-transport-https by default in Debian
 * include existing HTTPS mirrors wherever Debian mirrors are listed
   * https://www.debian.org/mirror/list
   * netselect-apt
   * http://http.debian.net/
   * apt-get's mirror://
 * make http://cdn.debian.net/ have an only-HTTPS version
 * encourage mirror operators to set up a Tor Hidden Service

 There is already a good collection of HTTPS mirrors to choose from
 (not-counting all the ones that have HTTPS enabled without a proper
 certificate).

 https://mirror.i3d.net/pub/debian/
 https://mirror.cpsc.ucalgary.ca/mirror/debian.org/debian/
 https://mirror.cse.unsw.edu.au/debian/
 https://mirrors.kernel.org/debian/
 https://the.earth.li/debian/
 https://mirror.vorboss.net/debian/
 https://ftp.arnes.si/pub/packages/debian/
 https://ftp.iitm.ac.in/debian/
 https://ftp.uni-erlangen.de/debian/
 https://ftp-stud.hs-esslingen.de/debian/
 https://mirrors.ustc.edu.cn/debian/
 https://mirror.cpsc.ucalgary.ca/mirror/debian.org/debian/
 https://dennou-q.gfd-dennou.org/debian/
 https://dennou-k.gfd-dennou.org/debian/
 https://dennou-h.gfd-dennou.org/debian/


 .hc

 [1] http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html


 --
 To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive: https://lists.debian.org/53b6150a.3000...@at.or.at




Re: concrete steps for improving apt downloading security and privacy

2014-07-09 Thread Kitty Cat
Thanks.

I'm new here. I was not on this list then. However, I just read the thread:

https://lists.debian.org/debian-security/2011/01/msg2.html

I saw that some of my concerns were mentioned there about obtaining and
verifying installation media, MITM attacks, etc.

I have previously verified installation media via the methods described in
the FAQ, downloading GPG keys, etc. and still
had an issue of having aptitude telling me that all available packages are
from untrusted sources. (This was some years
ago when I had this issue)

I seem to remember being offered security updates for the kernel, OpenSSL,
SSH, etc. where my only option was to download
untrusted packages. I would get warning messages from aptitude about
installing security updates.

Maybe there should be written a document that describes in detail in easy
to understand language what steps to take to
verify keys and verify that apt has not been compromised in an already
installed system. And also verifying that GPG has not
been compromised.

It is the job of the NSA to be able to compromise systems. We should make
that task as difficult as possible at every level
and also be able to easily verify that our system has not been corrupted.

I think having a good guide to checking your installed Debian system would
be of use. Particularly useful would be instructions
to check to see if your system has been compromised by validating all
already installed packages. MS Windows has an option
to check installed Windows components.


Some relevant links that I have previously discovered:

https://wiki.debian.org/Keysigning
https://wiki.debian.org/Keysigning/Coordination
http://www.debian.org/CD/verify
http://www.debian.org/CD/faq/#verify


On Wed, Jul 9, 2014 at 8:11 PM, Michael Stone mst...@debian.org wrote:

 On Wed, Jul 09, 2014 at 06:29:09PM -0600, Kitty Cat wrote:

 For years I have been concerned with MITM attacks on Debian mirrors.


 We discussed this literally within the past couple of months on this list,
 at length. Have you read the archives, including the posts about how to
 establish a trust path to the ISOs?

 Mike Stone



 --
 To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive: https://lists.debian.org/20140710021124.ga27...@mathom.us




Re: Debian owned by the NSA

2014-06-19 Thread Kitty Cat
Don't be alarmed, these are your overlords. Pay no attention. Go about your
business as usual as they try to take over the world.

https://www.youtube.com/watch?v=c9NAiojPzro