On Tue, 2012-02-21 at 16:59 -0600, Gunnar Wolf wrote:
Sadly, I think this is more propaganda and wishful thinking than
reality. And if I'm going to badmouth somebody, I'll badmouth myself.
I guess you're right, that for large software it's difficult to
impossible for the maintainer to really
On Mon, 2012-02-20 at 19:50 -0500, Michael Gilbert wrote:
But anyway, I think to get anywhere you'll need to help get Debian
policy 2.2.1 clarified for these kind of conditions. Then you'll be
able to submit bugs with appropriate RC severity so they'll have to be
handled.
Phew,.. changing the
I demand that Toni Mueller may or may not have written...
On 02/18/2012 11:48 AM, Thomas Koch wrote:
What about a debhelper script that receives an URL (or set of mirror
URLs) and a SHA1 and does the download and check?
If you're going this way, try to peek at the *BSD's ports systems,
On Tue, 21 Feb 2012, Gunnar Wolf wrote:
Henrique de Moraes Holschuh dijo [Sat, Feb 18, 2012 at 10:46:50AM -0200]:
Good packaging developers go to great lengths to be sure they are not
going to distribute anything trojaned. This takes a lot of work, and
often requires very goot working
On 02/18/2012 11:48 AM, Thomas Koch wrote:
What about a debhelper script that receives an URL (or set of mirror URLs)
and
a SHA1 and does the download and check?
If you're going this way, try to peek at the *BSD's ports systems,
specifically their 'distinfo' files. SHA1 is not enough, imho.
Henrique de Moraes Holschuh dijo [Sat, Feb 18, 2012 at 10:46:50AM -0200]:
Good packaging developers go to great lengths to be sure they are not
going to distribute anything trojaned. This takes a lot of work, and
often requires very goot working relationship with upstream to the point
of
On Sat, Feb 18, 2012 at 06:09:37AM +0200, Christoph Anton Mitterer wrote:
- packages that are just wrapper packages, download something from
somewhere without doing any
hashsum checks at all
How many in main?
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject
On 2012-02-20, Christoph Anton Mitterer cales...@scientia.net wrote:
2) Well I really feel bad now, having to point my finger at the Nagios
Maintainers as they really do a good job, but this just shocked me:
Bug #660585.
Well as I describe in the bug, it is practically (at the moment) of no
On Mon, 2012-02-20 at 09:56 +, Philipp Kern wrote:
Well, the rationale is documented in #333552 (which is linked to by the
changelog).
I dropped some words on rationale to the aforementioned bug,...
AIUI it doesn't matter because it's just about randomizing
unused parts of the packet.
On Fri, Feb 17, 2012 at 11:09 PM, Christoph Anton Mitterer wrote:
For many of those I've reported bugs (and I'm sure I didn't found a lot of
them, and I'm further sure
that new cases were introduced).
Some where closed, some where just ignored or denied.
Fortunately, this is rather uncommon.
Hey.
Just by now,... two additional cases of security problems crossed my
mind.
Though not related to our package signing, they originate to some extent
in the same problem as everything that was discussed in this thread
before:
Insufficient feeling for security [by maintainers].
1) Silent
To put things in perspective, I just wonder how strong this 'fortress'
really is, and whether this strength is only in our perception or
whether it is real. Let me give just one example: A developer downloads
a tarball from an upstream source, configures it, and does make install,
yet has not even
Christoph Anton Mitterer:
Hey.
I've decided that I think it's important to CC this d-d:
Debian has a good system of securing packages and making sure that only
signed stuff comes to the user.
Over time I've seen many holes in this:
- packages that are just wrapper packages, download
Am Samstag, den 18.02.2012, 11:48 +0100 schrieb Thomas Koch:
July 2011 VLC suffers from Companies spreading Malware bundled with VLC
This is no problem for us, because the malware was distributed on some
untrustworthy websites. We, as packagers, get the code directly from the
Videolan
* Christoph Anton Mitterer cales...@scientia.net, 2012-02-18, 06:09:
I've decided that I think it's important to CC this d-d:
Debian has a good system of securing packages and making sure that only
signed stuff comes to the user.
Over time I've seen many holes in this:
- packages that are just
On Sat, 18 Feb 2012 12:32:14 +0100
Jakub Wilk jw...@debian.org wrote:
* Christoph Anton Mitterer cales...@scientia.net, 2012-02-18, 06:09:
I've decided that I think it's important to CC this d-d:
Debian has a good system of securing packages and making sure that only
signed stuff comes to
On Sat, 18 Feb 2012 11:48:27 +0100
Thomas Koch tho...@koch.ro wrote:
I think as a start it should be made a policy that any wrapper package that
downloads code from the net must at least do a strong checksum check on the
downloaded code.
Not possible to enforce as a 'MUST' because, by
On Sat, 18 Feb 2012, Teus Benschop wrote:
To put things in perspective, I just wonder how strong this 'fortress'
really is, and whether this strength is only in our perception or
whether it is real. Let me give just one example: A developer downloads
a tarball from an upstream source,
Le samedi 18 février 2012 à 06:09 +0200, Christoph Anton Mitterer a
écrit :
Personally I decided to use GNOME-fallback, but via the meta-packages I
still got the GNOME shell... today
I've noticed that it silently installs an extension, which (I can only
assume this by the little
Jakub Wilk jw...@debian.org writes:
Could you point us to those which were ignored or denied?
At least pbuilder still disables secure APT by default, see #579028.
Regards
Ansgar
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
Am 18.02.2012 10:11, schrieb Teus Benschop:
To put things in perspective, I just wonder how strong this
'fortress'
really is, and whether this strength is only in our perception or
whether it is real. Let me give just one example: A developer
downloads
a tarball from an upstream source,
Am 18.02.2012 13:14, schrieb Benjamin Drung:
This is no problem for us, because the malware was distributed on
some
untrustworthy websites. We, as packagers, get the code directly from
the
Videolan project.
So you meet them once in person and exchanged some kind of PKI/shared
secret etc?
* Ansgar Burchardt ans...@debian.org, 2012-02-18, 14:14:
Could you point us to those which were ignored or denied?
At least pbuilder still disables secure APT by default, see #579028.
The bug is closed. Am I missing something?
But anyway, this is saddening. Hundreds (? - wild guess) of
Am 18.02.2012 13:32, schrieb Jakub Wilk:
I'll add to the list:
- Packages that download and run untrusted code at build time.
May I add a similar case...
Take the non-free flash as example... (yeah I know it's non-free and
not officially sec-supported)..
Even if it would use some SHA512 sums
Am 18.02.2012 14:34, schrieb Neil Williams:
- packages that eventually run some code which was downloaded
unsecured.
debootstrap used to be like that, pbuilder, and some others
Only a bug if this happens by default.
It is perfectly acceptable to support an option to disable SecureApt
-
just
Am 18.02.2012 14:40, schrieb Neil Williams:
I think as a start it should be made a policy that any wrapper
package that
downloads code from the net must at least do a strong checksum check
on the
downloaded code.
Not possible to enforce as a 'MUST' because, by definition,
third-party
Am 18.02.2012 15:30, schrieb Josselin Mouette:
Personally I decided to use GNOME-fallback, but via the
meta-packages I
still got the GNOME shell... today
I've noticed that it silently installs an extension, which (I can
only
assume this by the little
description) does some software
* Christoph Anton Mitterer cales...@scientia.net, 2012-02-18, 16:19:
Take the non-free flash as example... (yeah I know it's non-free and
not officially sec-supported)..
Even if it would use some SHA512 sums (hardcoded into the package) to
verify the download (I don't know whether it does),..
Jakub Wilk jw...@debian.org writes:
* Ansgar Burchardt ans...@debian.org, 2012-02-18, 14:14:
Could you point us to those which were ignored or denied?
At least pbuilder still disables secure APT by default, see #579028.
The bug is closed. Am I missing something?
pbuilder was changed to pass
On Sat, 18 Feb 2012 16:25:20 +0200
Christoph Anton Mitterer cales...@scientia.net wrote:
Am 18.02.2012 14:40, schrieb Neil Williams:
I think as a start it should be made a policy that any wrapper
package that
downloads code from the net must at least do a strong checksum check
on the
On Sat, 18 Feb 2012 15:59:38 +0200
Christoph Anton Mitterer cales...@scientia.net wrote:
Am 18.02.2012 10:11, schrieb Teus Benschop:
To put things in perspective, I just wonder how strong this
'fortress'
really is, and whether this strength is only in our perception or
whether it is
On Sat, 18 Feb 2012 15:49:30 +, Neil Williams codeh...@debian.org wrote:
On Sat, 18 Feb 2012 16:25:20 +0200
Christoph Anton Mitterer cales...@scientia.net wrote:
Am 18.02.2012 14:40, schrieb Neil Williams:
I think as a start it should be made a policy that any wrapper
package that
On Sat, Feb 18, 2012 at 11:48:27AM +0100, Thomas Koch wrote:
What about a debhelper script that receives an URL (or set of mirror
URLs) and a SHA1 and does the download and check?
Please use something stronger than SHA-1. SHA-1 has some weaknesses and
something like SHA-256 or SHA-512 should
Am 18.02.2012 16:18, schrieb Jakub Wilk:
The bug is closed. Am I missing something?
But anyway, this is saddening. Hundreds (? - wild guess) of
developers have been building their packages in insecure environment,
yet pbuilder maintainer and a member of Security Team believe that it
was a
Am 18.02.2012 19:03, schrieb brian m. carlson:
On Sat, Feb 18, 2012 at 11:48:27AM +0100, Thomas Koch wrote:
What about a debhelper script that receives an URL (or set of mirror
URLs) and a SHA1 and does the download and check?
Please use something stronger than SHA-1. SHA-1 has some weaknesses
Am 18.02.2012 18:45, schrieb Philip Hands:
He's talking about stuff like flash-nonfree (or whatever) where we
ship
a wrapper that wgets the actual tarball for you from the distributor,
and checks the checksum of whatever it ends up with.
Yes!
(perhaps if paranoid do the
download from
On Sat, Feb 18, 2012 at 04:31:19PM +0100, Ansgar Burchardt wrote:
Jakub Wilk jw...@debian.org writes:
* Ansgar Burchardt ans...@debian.org, 2012-02-18, 14:14:
Could you point us to those which were ignored or denied?
At least pbuilder still disables secure APT by default, see #579028.
The
On 02/18/2012 08:40 PM, Neil Williams wrote:
On Sat, 18 Feb 2012 11:48:27 +0100
Thomas Koch tho...@koch.ro wrote:
I think as a start it should be made a policy that any wrapper package
that
downloads code from the net must at least do a strong checksum check on the
downloaded code.
On 02/18/2012 09:30 PM, Josselin Mouette wrote:
Plugin integrity is
guaranteed by SSL, and extensions have been checked before being put on
the website.
I feel much much safer now that I know that my plugin downloads
are protected by Diginotar ! :)
Thomas
--
To UNSUBSCRIBE, email to
On Sat, 18 Feb 2012, Neil Williams wrote:
On Sat, 18 Feb 2012 16:25:20 +0200
Christoph Anton Mitterer cales...@scientia.net wrote:
Am 18.02.2012 14:40, schrieb Neil Williams:
I think as a start it should be made a policy that any wrapper
package that
downloads code from the net must
On Sat, 18 Feb 2012, Philip Hands wrote:
On Sat, 18 Feb 2012 15:49:30 +, Neil Williams codeh...@debian.org wrote:
On Sat, 18 Feb 2012 16:25:20 +0200
Christoph Anton Mitterer cales...@scientia.net wrote:
Am 18.02.2012 14:40, schrieb Neil Williams:
I think as a start it should be
On Sat, Feb 18, 2012 at 04:42:38PM -0200, Henrique de Moraes Holschuh wrote:
Against what? The source is only downloaded from upstream once per
upstream release, what is there to check against?
Upstream VCS, previous releases (when the diff is small enough), request
that upstream publish
Hey.
I've decided that I think it's important to CC this d-d:
Debian has a good system of securing packages and making sure that only
signed stuff comes to the user.
Over time I've seen many holes in this:
- packages that are just wrapper packages, download something from
somewhere without
43 matches
Mail list logo