Hi,
> On Jun 30, 2020, at 9:41 PM, Frazer Clews <[email protected]>
> wrote:
>
> So is it agreed when we will ban http, ftp, and git if its set in
> project.conf to only allow secure downloads? Also how do we want to deal with
> GPG, or can that come at a later date?
>
I’m not personally convinced that the URI scheme is that meaningful (ssh://
should be secure ? what about future proofing for new, secure URI schemes ?),
or even that a URI scheme is a hard requirement for every possible kind of
remote socket connection (sources fetch data, will they always use a URI to
describe where from ?).
This doesn’t appear very defined, while it may make sense as a policy for
gnome-build-meta (and as Sander suggests, possibly a good thing to validate in
their git hooks), I don’t feel very confident that a feature in BuildStream for
this is meaningful.
At best, this might be yet another good argument for implementing the much
desired URL reporting via `bst source show`, which would allow gnome-build-meta
to implement their policy more easily ?
Cheers,
-Tristan
>
> -------- Forwarded Message --------
> Subject: Re: [BuildStream] Add setting to disallow insecure transports
> Date: Thu, 25 Jun 2020 19:49:36 +0200
> From: Sander Striker via buildstream-list <[email protected]>
> Reply-To: Sander Striker <[email protected]>
> To: Michael Catanzaro <[email protected]>
> CC: BuildStream <[email protected]>
>
>
>> On Thu, Jun 25, 2020 at 4:58 PM Michael Catanzaro <[email protected]>
>> wrote:
>>
>> [...]
>> The use case is that I keep discovering elements in gnome-build-meta
>> that use http://. I just counted and we have 12 currently, all of which
>> must have snuck in since the last time I checked for them. Because we
>> don't have project.refs on the master branch, that means any MITM
>> attacker between the build server and the server that hosts the tarball
>> can trivially replace the tarball with arbitrary malicious content and
>> we would never notice. This is quite easy for a skilled attacker to do,
>> e.g. with a BGP attack. Without project.refs or refs pinned in the
>> file, we don't notice and will happily include the malicious content in
>> the new runtime.
>>
>> http:// plus GPG could theoretically be secure, but that requires
>> significant effort to set up and I really don't care. There is zero
>> excuse for not using https:// in 2020. The safest approach is to
>> completely ban it from the GNOME runtime (and freedesktop-sdk).
>> Similarly, ftp:// and git:// also need to be banned. If we have
>> projects that cannot be downloaded safely from upstream, we can rehost
>> them.
>
> Absent a feature in BuildStream currently, would it be a suggestion to add a
> validation hook on the git repository that rejects definitions that have the
> url pattern you wish to ban?
>
> Cheers,
>
> Sander
>
>> Michael
>>
>>
>> _______________________________________________
>> buildstream-list mailing list
>> [email protected]
>> https://mail.gnome.org/mailman/listinfo/buildstream-list
>
> <Attached Message Part>