Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Julian Mehnle
Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy and available to every user: 1. get any clean Debian keyring (or just the key

Re: Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Goswin von Brederlow
Julian Mehnle [EMAIL PROTECTED] writes: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy and available to every user:

Re: Revocation list for old packages with security holes (was: Re: Revival of the signed debs discussion)

2003-12-10 Thread Andreas Barth
* Julian Mehnle ([EMAIL PROTECTED]) [031210 13:40]: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy and available to every

Re: Revival of the signed debs discussion

2003-12-07 Thread Anthony DeRobertis
On Fri, 2003-12-05 at 22:46, Goswin von Brederlow wrote: No it isn't. For it to be non-repudiable, you'd have to demonstrate that the key has not been compromised; that the developer knew what he was signing (as opposed to a trojaned gpg telling him one thing while doing another); etc.

Re: Revival of the signed debs discussion

2003-12-06 Thread Henning Makholm
Scripsit Goswin von Brederlow [EMAIL PROTECTED] If a package is compromised we can proof that the DD of the package either is malicious or incompetent. Say, we just had a major compromise on certain Debian machines. Pray tell, who do you think this proves is malicious or incompetent? We'd

Re: Revival of the signed debs discussion

2003-12-06 Thread Andreas Barth
* Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]: Scripsit Goswin von Brederlow [EMAIL PROTECTED] If a package is compromised we can proof that the DD of the package either is malicious or incompetent. Say, we just had a major compromise on certain Debian machines. Pray tell, who do

Requirements on signatures on debs (was: Revival of the signed debs discussion)

2003-12-06 Thread Andreas Barth
First: There is now a version of debsigs that creats debs that the apt-utils could cope with, see http://debsigs.turmzimmer.net/ (I tried it with the unmodified apt-utils of woody). * Goswin von Brederlow ([EMAIL PROTECTED]) [031202 04:55]: I agree with you that every instance along the way to

Re: Requirements on signatures on debs (was: Revival of the signed debs discussion)

2003-12-06 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: First: There is now a version of debsigs that creats debs that the apt-utils could cope with, see http://debsigs.turmzimmer.net/ (I tried it with the unmodified apt-utils of woody). * Goswin von Brederlow ([EMAIL PROTECTED]) [031202 04:55]: I agree

Re: Revival of the signed debs discussion

2003-12-06 Thread Goswin von Brederlow
Henning Makholm [EMAIL PROTECTED] writes: Scripsit Goswin von Brederlow [EMAIL PROTECTED] If a package is compromised we can proof that the DD of the package either is malicious or incompetent. Say, we just had a major compromise on certain Debian machines. Pray tell, who do you think

Re: Revival of the signed debs discussion

2003-12-06 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: * Henning Makholm ([EMAIL PROTECTED]) [031206 13:25]: Scripsit Goswin von Brederlow [EMAIL PROTECTED] If a package is compromised we can proof that the DD of the package either is malicious or incompetent. Say, we just had a major compromise

Re: Revival of the signed debs discussion

2003-12-05 Thread Andreas Barth
* Matt Zimmerman ([EMAIL PROTECTED]) [031204 22:25]: On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote: On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: What kind of real world attacks do signed debs prevent? The only one which comes to mind is a rogue

Re: Revival of the signed debs discussion

2003-12-05 Thread Manoj Srivastava
On Thu, 4 Dec 2003 14:41:43 -0500, Matt Zimmerman [EMAIL PROTECTED] said: On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman [EMAIL PROTECTED] said: What kind of real world attacks do signed debs prevent? Not a compromised

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes: On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote: Signed debs establish a trust chain from the buildd to the user and from the buildd-admin/maintainer to the user as well as copy the existing trust chain from ftp-master to the

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote: I wrote a little script that checks what apt things its installing against what the control files of the debs say. I will test it with some more fakes and then file it in the

Re: Revival of the signed debs discussion

2003-12-05 Thread Matt Zimmerman
On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote: Matt Zimmerman [EMAIL PROTECTED] writes: Release signing protects against a hostile or compromised mirror, network, DNS server, proxy server, and a host of other, similar attacks, and also prevents most forms of the

Re: Revival of the signed debs discussion

2003-12-05 Thread Anthony DeRobertis
On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote: The only one which comes to mind is a rogue Debian developer that you do not wish to trust, even though the project trusts him. Not quite. The signed deb is non-repudiable authorship -- nice to know whence the software cometh.

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes: On Fri, Dec 05, 2003 at 12:24:07AM +0100, Goswin von Brederlow wrote: Matt Zimmerman [EMAIL PROTECTED] writes: Release signing protects against a hostile or compromised mirror, network, DNS server, proxy server, and a host of other, similar

Re: Revival of the signed debs discussion

2003-12-05 Thread Goswin von Brederlow
Anthony DeRobertis [EMAIL PROTECTED] writes: On Fri, 2003-12-05 at 04:54, Manoj Srivastava wrote: The only one which comes to mind is a rogue Debian developer that you do not wish to trust, even though the project trusts him. Not quite. The signed deb is non-repudiable

Re: Revival of the signed debs discussion

2003-12-04 Thread Andreas Barth
* Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]: Op wo 03-12-2003, om 10:09 schreef Andreas Barth: file back signed by the build admin. The debian archive scripts accepts packages signed by a buildd-key only if it is a binary package for this architecture, the key is valid (i.e.

Re: Revival of the signed debs discussion

2003-12-04 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: * Wouter Verhelst ([EMAIL PROTECTED]) [031203 23:10]: Op wo 03-12-2003, om 10:09 schreef Andreas Barth: file back signed by the build admin. The debian archive scripts accepts packages signed by a buildd-key only if it is a binary package

Re: Revival of the signed debs discussion

2003-12-04 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]: Andreas Barth [EMAIL PROTECTED] writes: Ok? Sounds ok but the upload rules can be tightened much much later. First we have to get signing started, which means fixing apt-utils or debsigs or preferably both. And of cause change

Re: Revival of the signed debs discussion

2003-12-04 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: * Goswin von Brederlow ([EMAIL PROTECTED]) [031204 15:10]: Andreas Barth [EMAIL PROTECTED] writes: Ok? Sounds ok but the upload rules can be tightened much much later. First we have to get signing started, which means fixing apt-utils or

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 03:03:39AM +0100, Goswin von Brederlow wrote: Signed debs establish a trust chain from the buildd to the user and from the buildd-admin/maintainer to the user as well as copy the existing trust chain from ftp-master to the user into the deb itself. The Release.gpg

Re: Revival of the signed debs discussion

2003-12-04 Thread Manoj Srivastava
On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman [EMAIL PROTECTED] said: What kind of real world attacks do signed debs prevent? Not a compromised buildd, or a compromised maintainer's workstation. It would allow me to copy .debs around with other people, or use .debs not made

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman [EMAIL PROTECTED] said: What kind of real world attacks do signed debs prevent? Not a compromised buildd, or a compromised maintainer's workstation. It would allow

Re: Revival of the signed debs discussion

2003-12-04 Thread Daniel Jacobowitz
On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: On Thu, Dec 04, 2003 at 12:28:41PM -0600, Manoj Srivastava wrote: On Thu, 4 Dec 2003 11:47:50 -0500, Matt Zimmerman [EMAIL PROTECTED] said: What kind of real world attacks do signed debs prevent? Not a compromised

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Thu, Dec 04, 2003 at 03:58:38PM -0500, Daniel Jacobowitz wrote: On Thu, Dec 04, 2003 at 02:41:43PM -0500, Matt Zimmerman wrote: What kind of real world attacks do signed debs prevent? The only one which comes to mind is a rogue Debian developer that you do not wish to trust, even

Re: Revival of the signed debs discussion

2003-12-04 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 08:07:53AM +0100, Goswin von Brederlow wrote: I wrote a little script that checks what apt things its installing against what the control files of the debs say. I will test it with some more fakes and then file it in the BTS. Why would you do this with a script rather

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that.

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: Hi, Henrique de Moraes Holschuh wrote: On Tue, 02 Dec 2003, Wouter Verhelst wrote: So unless you have a suggestion that would solve this particular issue, I'm afraid this idea won't work in practice. We could verify if

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote: Bernd Eckenfels [EMAIL PROTECTED] writes: How often has this person glance over the results? As I understand debian build daemons run unattended and build continously. Correct me when I am wrong here. But if I asume

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, [ I'm Cc-ing Werner Koch on this ] Wouter Verhelst: On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: Hi, Henrique de Moraes Holschuh wrote: On Tue, 02 Dec 2003, Wouter Verhelst wrote: So unless you have a suggestion that would solve this particular issue, I'm

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
On Wed, Dec 03, 2003 at 12:08:10PM +0100, Matthias Urlichs wrote: Wouter Verhelst: Especially in the case of larger .debs, that would probably reduce the actual signature size as well... ?? A hash is a hash, and should be independent of file size. Obviously, sorry. I don't know how I got

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-03 Thread Bernhard R. Link
* Chad Walstrom [EMAIL PROTECTED] [031202 18:14]: I'm not following your logic, if that's what you call it. You're saying that checking the current filesystem on a daily basis is NOT a good way to verify filesystem integrity? I say it won't give you an real advantage over checking the

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, Werner Koch: There are some minor problems because we don't just sign a hash but need to add some more data. Creating an incomplete hash on the remote machine is not the cleanest solution, so I have to come up with a better way. You're the GPG expert... I'm also a bit concerned about

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Wouter Verhelst [EMAIL PROTECTED] writes: On Tue, Dec 02, 2003 at 10:16:32PM +0100, Matthias Urlichs wrote: Hi, Henrique de Moraes Holschuh wrote: On Tue, 02 Dec 2003, Wouter Verhelst wrote: So unless you have a suggestion that would solve this particular issue, I'm afraid this

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matthias Urlichs [EMAIL PROTECTED] writes: Hi, Werner Koch: There are some minor problems because we don't just sign a hash but need to add some more data. Creating an incomplete hash on the remote machine is not the cleanest solution, so I have to come up with a better way.

Re: Revival of the signed debs discussion

2003-12-03 Thread Matthias Urlichs
Hi, Werner Koch: On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said: the local side is supposed to sign should probably be encrypted with the signer's public key, otherwise I can just replace the data packet with something that ends up signing a totally different file. :-/ And if

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Bernd Eckenfels [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote: What the admins signature can gives us is a trusted timestamp and another pair of eyes reading the changes files. Well, a trusted timestamp can be added/required by a third

Re: Revival of the signed debs discussion

2003-12-03 Thread Werner Koch
On Wed, 3 Dec 2003 12:08:10 +0100, Matthias Urlichs said: signature algorithm would allow for hashing the data on the remote machine, and signing that hash locally. ... that would work. It'd probably require a few hooks within GPG to generate a hash packet / . Since I moved my actual

Re: Revival of the signed debs discussion

2003-12-03 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote: Matt Zimmerman [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: But this kind of tampering _can_ be checked by apt before installing the deb simply by adding a

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Anthony Towns aj@azure.humbug.org.au writes: On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: You change the contents of the compromised Packages file, so that Package: bash is accompanied by Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb which

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: But this kind of tampering _can_ be checked by apt before installing the deb simply by adding a signature verifyer into the DPkg::Pre-Install-Pkgs config option, the same

Re: Revival of the signed debs discussion

2003-12-03 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:25]: Henning Makholm [EMAIL PROTECTED] writes: If an attacker compromises the buildd to the point where he can gain access to its secret key, he could just as well attack its build environment, or simply use his access to convincingly

Re: Revival of the signed debs discussion

2003-12-03 Thread Wouter Verhelst
Op wo 03-12-2003, om 10:09 schreef Andreas Barth: file back signed by the build admin. The debian archive scripts accepts packages signed by a buildd-key only if it is a binary package for this architecture, the key is valid (i.e. in the right year), and this package has been handed

Re: Revival of the signed debs discussion

2003-12-03 Thread Anthony Towns
On Tue, Dec 02, 2003 at 02:02:19PM -0600, Steve Langasek wrote: You change the contents of the compromised Packages file, so that Package: bash is accompanied by Filename: pool/main/b/bash/vulnerable-ident-server_1.0-1_i386.deb which contains a perfectly valid .deb file, signed by a DD, that

Re: Revival of the signed debs discussion

2003-12-03 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031203 03:40]: Andreas Barth [EMAIL PROTECTED] writes: * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: So unless you have a suggestion that would solve this particular issue, I'm afraid this idea won't work in practice. Two suggestions

Re: Revival of the signed debs discussion

2003-12-03 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 06:50:09AM +0100, Goswin von Brederlow wrote: [TSP] If there is no person sitting there signing it manually its useless. Why is that? I trust an automated service to provide me signed timestamps. In fact a Box doing exactly this and nothing else can be very securely

Re: Revival of the signed debs discussion

2003-12-03 Thread Werner Koch
On Wed, 3 Dec 2003 13:26:02 +0100, Matthias Urlichs said: I'm also a bit concerned about MitM attacks; the hash-or-whatever which Obviously you can do this only using a secure channel. the local side is supposed to sign should probably be encrypted with the signer's public key, otherwise I

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Matt Zimmerman [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 06:43:18AM +0100, Goswin von Brederlow wrote: Matt Zimmerman [EMAIL PROTECTED] writes: On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: But this kind of tampering _can_ be checked by apt

Re: Revival of the signed debs discussion

2003-12-03 Thread Goswin von Brederlow
Wouter Verhelst [EMAIL PROTECTED] writes: Op wo 03-12-2003, om 10:09 schreef Andreas Barth: file back signed by the build admin. The debian archive scripts accepts packages signed by a buildd-key only if it is a binary package for this architecture, the key is valid (i.e. in the

Re: Revival of the signed debs discussion

2003-12-02 Thread Thomas Viehmann
Martin Michlmayr ([EMAIL PROTECTED]) wrote: * Thomas Viehmann [EMAIL PROTECTED] [2003-12-01 15:30]: BTW: This is offtopic, but it seems that potato is neither in debian/ nor in debian-archive/? Potato is on archive.debian.org (in /debian-archive/dists). Ah. Thanks.

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Goswin von Brederlow ([EMAIL PROTECTED]) [031202 04:55]: Andreas Barth [EMAIL PROTECTED] writes: Technical details should IMHO be discussed later, but a sample passport could look like: accepted by katie on Mon, 1 Dec 2003 20:34:58 + because of good signature of DD, KeyID

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy and available to every user: 1. get any clean Debian keyring (or

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Eduard Bloch
Moin Goswin! Goswin von Brederlow schrieb am Tuesday, den 02. December 2003: I would like to see the following things happen: - current md5sums file in control.tar.gz should contain checksums of really all files - a signature of the md5sums file should be stored either in

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Joey Hess [EMAIL PROTECTED] writes: John Goerzen wrote: Please check out the debsigs package. I wrote it when I worked at Progeny back in 2001, and Branden Robinson maintains it these days. It does exactly that. Unfortunatly, the method debsigs uses to add the signature to the .deb

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Goswin von Brederlow
Eduard Bloch [EMAIL PROTECTED] writes: Moin Goswin! Goswin von Brederlow schrieb am Tuesday, den 02. December 2003: I would like to see the following things happen: - current md5sums file in control.tar.gz should contain checksums of really all files - a signature of the

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being questioned, the procedure would be easy and available to every

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Tom [EMAIL PROTECTED] writes: On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: * Joey Hess ([EMAIL PROTECTED]) [031202 02:55]: Goswin von Brederlow wrote: What can we do with deb signatures? For our current problem, the integrity of the debian archive being

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote: Tom [EMAIL PROTECTED] writes: What precautions are taken that the DD actually signed it with the DD's private key? Set aside the possibility that the DD herself is actually the attacker. You never can. But once the

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Bernhard R. Link
* Chad Walstrom [EMAIL PROTECTED] [031201 22:28]: md5sums and signatures are most useful in the context of installation. Post-installation, you cannot be guaranteed that an intrusion rootkit doesn't compromise the md5sum files themselves. Using the installed *.md5sum files to check the

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Tom [EMAIL PROTECTED] writes: On Tue, Dec 02, 2003 at 01:17:58PM +0100, Goswin von Brederlow wrote: Tom [EMAIL PROTECTED] writes: What precautions are taken that the DD actually signed it with the DD's private key? Set aside the possibility that the DD herself is actually the

Re: Revival of the signed debs discussion

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 02:20:43PM +0100, Goswin von Brederlow wrote: There is no security as strong as many people reading the source over and over. You can't hack their brains to skip over the backdoor code and you can only obfuscate a backdoor so much. Allright, allright, I'll cry uncle.

Re: Revival of the signed debs discussion

2003-12-02 Thread John Goerzen
On Tue, Dec 02, 2003 at 11:07:53AM +0100, Andreas Barth wrote: The canoical attack against signed debs in this situation is to find a signed deb on snapshot.debian.net that contains a known security hole. To avoid this attack, it is necessary that the filename of the deb or the version of

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that. How would you avoid it? Make the replacement package really be a different package entirely, of a higher version than the package it purports to replace. I think aj had some

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Goswin von Brederlow [EMAIL PROTECTED] There is no security as strong as many people reading the source over and over. You can't hack their brains to skip over the backdoor code and you can only obfuscate a backdoor so much. I refer you to Ken Thompson's Turing award lecture. If

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Chad Walstrom
On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote: A true IDS is needed, such as aide, tripwire, or cfengine to detect post-installation intrusion. Tie in aide or tripwire database checks/updates with the apt.conf PostInst option in addition to a daily cronjon to ensure the

Re: Revival of the signed debs discussion

2003-12-02 Thread Wouter Verhelst
Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow: [...] Deb signatures method C: And now for something completly different. A man with 3 noses. :) Instead of keeping extra files with the signature of the deb the information could be stored inside the deb itself. [...] As much as I

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Metzler
Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that. How would you avoid it? Make the replacement package really be a different package entirely, of a higher version than the package it

Re: Revival of the signed debs discussion

2003-12-02 Thread Thomas Viehmann
Goswin von Brederlow wrote: Joey Hess [EMAIL PROTECTED] writes: I submitted a one line patch to apt to fix this and behave like dpkg. I hope this gets added soon. Till then its either signed debs or pre-configuring of packages. I filed bugs about this a long time ago, it is apparently

Re: Revival of the signed debs discussion

2003-12-02 Thread Henrique de Moraes Holschuh
On Tue, 02 Dec 2003, Wouter Verhelst wrote: So unless you have a suggestion that would solve this particular issue, I'm afraid this idea won't work in practice. We could verify if the gpg agent (gpa? I forget the name...) cannot do this over a secure channel. It should be able to, and if not,

Re: Revival of the signed debs discussion

2003-12-02 Thread Scott James Remnant
No Cc was necessary, I am subscribed to debian-devel. On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote: Scott James Remnant [EMAIL PROTECTED] writes: A compromised dinstall on ftp-master could also replace the keyring package with a new one containing an extra key, used to sign the

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Wouter Verhelst wrote: Requiring us to log in to the autobuilder to sign the .deb remotely is not acceptable, for two reasons: * it's way too much work for most of us * it requires copying the secret key over, which is, uh, a bad idea. An alternative would be to copy over the .debs, sign

Re: Revival of the signed debs discussion

2003-12-02 Thread Joey Hess
Andreas Metzler wrote: I still don't understand how you change the version number (or the package-name) without breaking the signature. Which signature? The Packages file is being modified, so of course the hain of trust back to the Release file signature can be used to catch tampering with it.

Re: Revival of the signed debs discussion

2003-12-02 Thread Steve Langasek
On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that. How would you avoid it? Make the replacement package really be a

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Wouter Verhelst [EMAIL PROTECTED] Requiring us to log in to the autobuilder to sign the .deb remotely is not acceptable, for two reasons: * it's way too much work for most of us * it requires copying the secret key over, which is, uh, a bad idea. Um, perhaps this is really stupid

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: As much as I like this idea in principle, storing signatures inside .debs has a serious problem: it won't work for us buildd maintainers. Workability for the buildd maintainers is IMHO _certainly_ one important thing. As I explain in my

Re: Revival of the signed debs discussion

2003-12-02 Thread Matthias Urlichs
Hi, Henrique de Moraes Holschuh wrote: On Tue, 02 Dec 2003, Wouter Verhelst wrote: So unless you have a suggestion that would solve this particular issue, I'm afraid this idea won't work in practice. We could verify if the gpg agent (gpa? I forget the name...) cannot do this over a secure

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Barth
* Steve Langasek ([EMAIL PROTECTED]) [031202 22:10]: AFAIK, apt does not sanity check the relationship between package names and filenames (and it's not obvious that this should be part of its responsibilities), and dpkg only gets a list of .debs to install once they've been downloaded. So

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm [EMAIL PROTECTED] writes: Scripsit Goswin von Brederlow [EMAIL PROTECTED] There is no security as strong as many people reading the source over and over. You can't hack their brains to skip over the backdoor code and you can only obfuscate a backdoor so much. I refer

Re: Revival of the signed debs discussion

2003-12-02 Thread Andreas Metzler
Steve Langasek [EMAIL PROTECTED] wrote: On Tue, Dec 02, 2003 at 06:05:44PM +0100, Andreas Metzler wrote: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that. How would you avoid it? Make

Re: Revival of the signed debs discussion

2003-12-02 Thread Henning Makholm
Scripsit Goswin von Brederlow Henning Makholm [EMAIL PROTECTED] writes: I refer you to Ken Thompson's Turing award lecture. If someone who really means business manages to compromise binary toolchain debs, all the hackers in the world reading source over and over will not find the

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Wouter Verhelst [EMAIL PROTECTED] writes: Op ma 01-12-2003, om 14:34 schreef Goswin von Brederlow: [...] Deb signatures method C: And now for something completly different. A man with 3 noses. :) Instead of keeping extra files with the signature of the deb the information could be

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Metzler [EMAIL PROTECTED] writes: Joey Hess [EMAIL PROTECTED] wrote: Goswin von Brederlow wrote: dpkg that it is downgrading the package, and a clever attacker might avoid even that. How would you avoid it? Make the replacement package really be a different package

Re: debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-02 Thread Goswin von Brederlow
Chad Walstrom [EMAIL PROTECTED] writes: On Tue, Dec 02, 2003 at 02:01:23PM +0100, Bernhard R. Link wrote: A true IDS is needed, such as aide, tripwire, or cfengine to detect post-installation intrusion. Tie in aide or tripwire database checks/updates with the apt.conf PostInst option

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Scott James Remnant [EMAIL PROTECTED] writes: No Cc was necessary, I am subscribed to debian-devel. On Tue, 2003-12-02 at 03:30, Goswin von Brederlow wrote: Scott James Remnant [EMAIL PROTECTED] writes: A compromised dinstall on ftp-master could also replace the keyring package

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Joey Hess [EMAIL PROTECTED] writes: Andreas Metzler wrote: I still don't understand how you change the version number (or the package-name) without breaking the signature. Which signature? The Packages file is being modified, so of course the hain of trust back to the Release file

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm [EMAIL PROTECTED] writes: Scripsit Wouter Verhelst [EMAIL PROTECTED] Requiring us to log in to the autobuilder to sign the .deb remotely is not acceptable, for two reasons: * it's way too much work for most of us * it requires copying the secret key over, which is, uh,

Re: Revival of the signed debs discussion

2003-12-02 Thread Bernd Eckenfels
On Wed, Dec 03, 2003 at 03:17:20AM +0100, Goswin von Brederlow wrote: What the admins signature can gives us is a trusted timestamp and another pair of eyes reading the changes files. Well, a trusted timestamp can be added/required by a third party. No need to bother a build admin with signing

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Andreas Barth [EMAIL PROTECTED] writes: * Wouter Verhelst ([EMAIL PROTECTED]) [031202 19:40]: So unless you have a suggestion that would solve this particular issue, I'm afraid this idea won't work in practice. Two suggestions come to my mind. However, I can't judge how useful they are

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Henning Makholm [EMAIL PROTECTED] writes: Scripsit Goswin von Brederlow Henning Makholm [EMAIL PROTECTED] writes: I refer you to Ken Thompson's Turing award lecture. If someone who really means business manages to compromise binary toolchain debs, all the hackers in the world

Re: Revival of the signed debs discussion

2003-12-02 Thread Matt Zimmerman
On Wed, Dec 03, 2003 at 03:07:17AM +0100, Goswin von Brederlow wrote: But this kind of tampering _can_ be checked by apt before installing the deb simply by adding a signature verifyer into the DPkg::Pre-Install-Pkgs config option, the same mechanism apt-listchanges already uses to display

Re: Revival of the signed debs discussion

2003-12-02 Thread Scott James Remnant
On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote: Scott James Remnant [EMAIL PROTECTED] writes: No Cc was necessary, I am subscribed to debian-devel. I can only assume you ignored this out of either spite or stupidity. I don't mind too much if people forget the code of conduct

Re: Revival of the signed debs discussion

2003-12-02 Thread Goswin von Brederlow
Scott James Remnant [EMAIL PROTECTED] writes: On Wed, 2003-12-03 at 01:52, Goswin von Brederlow wrote: Scott James Remnant [EMAIL PROTECTED] writes: No Cc was necessary, I am subscribed to debian-devel. I can only assume you ignored this out of either spite or stupidity. I

Re: Revival of the signed debs discussion

2003-12-01 Thread John Goerzen
On Mon, Dec 01, 2003 at 03:30:58PM +0100, Thomas Viehmann wrote: However: As md5sum my.deb ; ar q my.deb _deb_signature ; ar d my.deb _deb_signature ; md5sum my.deb gives two different lines, I'd think signing the individual members of the deb, not the deb in itself is Please check out the

Re: Revival of the signed debs discussion

2003-12-01 Thread Scott James Remnant
On Mon, 2003-12-01 at 13:34, Goswin von Brederlow wrote: We have no continous trust chain going from the maintainer (also meaning buildd + admin), ftp-master.d.o, mirrors to the user. A compromised dinstall on master could replace binary uploads with trojan versions without any user being

Re: Revival of the signed debs discussion

2003-12-01 Thread John Goerzen
On Mon, Dec 01, 2003 at 03:56:59PM +, Scott James Remnant wrote: Assuming that level of compromise, there's no recent to suspect that they couldn't have free reign adding anything to the archive they wanted. Signed .debs gain you nothing here. If every .deb must be signed by a developer,

debsums for maintainer scripts (was: Re: Revival of the signed debs discussion)

2003-12-01 Thread Eduard Bloch
#include hallo.h John Goerzen schrieb am Monday, den 01. December 2003: Debsigs generates its signature by effectively cating the control and data components of the ar file together, running that through gpg, and storing the resulting signature data in a new component of the ar file. I did

Re: Revival of the signed debs discussion

2003-12-01 Thread John Goerzen
On Mon, Dec 01, 2003 at 05:00:53PM +, Scott James Remnant wrote: No Cc was necessary, I am subscribed to debian-devel. Please set your Mail-Followup-To accordingly, then. If every .deb must be signed by a developer, and we assume that no developer leaves secret keys on public machines,

  1   2   >