On 01/01/2017 08:22 PM, Andrew David Wong wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2017-01-01 15:20, Chris Laprise wrote:
On 12/31/2016 11:43 AM, Andrew David Wong wrote:
On 2016-12-30 19:32, Chris Laprise wrote:
On 12/30/2016 12:58 AM, Andrew David Wong wrote:
After meditating on this thread for a little over three years,
I'd like to revive it, because I think Marek made an important
point here, and I don't quite understand Joanna's response.

If we don't trust GPG in our backup system because it does too
much parsing of untrusted data before verification (which I
believe is correct), then why do we trust it in our dom0 update
system?
Ultimately, only Joanna can decide whether some guardian functions
are suitable for Qubes. But I don't necessarily buy into her
assertion about gpg verify: Watch some verbose output and declare
'Hark! Complexity!'. Is it /that/ worrisome for gpg to iterate over
X message segments and decide if each is valid?

Interesting point. I wish I knew.
If Qubes devs are going to start making commitments of time and effort
based on such claims, and disrupting the admin aspect of using Qubes as
well, I'd advise you to back them up with something rigorous before
leading the community down that path.

You're misinterpreting the nature of this conversation. It's just a
discussion. No decisions or commitments have been made. I'm primarily
asking questions. The claims I'm making are conditional in nature. It's
quite possible that no action is warranted, but that's by no means obvious.


Given this thread was used to make implementation decisions in qmv-backup, the suggestion of extending this assumption about GPG to updates looked more than hypothetical to me (and being about multi-party transactions, it happens to involve far more effort and complexity than backups). Thanks for the clarification. :)


Laboring under the assumption that GPG is bad, you won't even know if
your Qubes-curated Fedora/Debian packages are good unless you get those
projects to switch to your alternative as well.

First, I'm not laboring under that assumption. It's one of the things
about which I'm inquiring.

Second, that's not necessarily true. There could be solutions that don't
require other projects to change anything (for example, a hypothetical
system in which we first compute the hash of a package with minimal
pre-parsing, compare the hash value to a distributed database, then, if
it matches, proceed to verify the package's signature with GPG).

If the Qubes Project is not authoring some of the packages, it sounds unlikely to work as a primary step in verifying integrity. This may /necessarily/ be true until the upstream suppliers for dom0 change.

Assuming GPG is an attack vector (a BIG assumption), I don't think having users compare hashes with each other over HTTPS links, for example, is going to suffice in addition to GPG if the former won't suffice on its own. We would need some way of obtaining upstream packages without any invocation of GPG and then verify them somehow without invoking GPG. After that point (assuming at least some packages will need to be compiled) we need to deal with the much more real threat of the /compiler/ being targeted for attack. That is all /prior/ to the step of generating a hash and uploading it to a database.

--

I will say that if moving away from GPG does turn out to be warranted (though I'll make a guess that it won't be), I'd suggest replacing it in the development procedures first before trying it with general distribution---fundamental changes should be practiced by developers first. Beyond that, trialling a new verification procedure on the ISO download page would make sense, since the image taken as a whole is a work authored by the Qubes Project.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/54dcaea0-987b-78c9-4c74-eca8c5406cad%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to