[Bug 1467716] Re: "gem install" fetches packages from unencrypted HTTP URL

2015-09-09 Thread Marc Deslauriers
The instructions given in the bug description aren't accurate.

The make gem use an https URL, you need to create an /etc/gemrc or
~/.gemrc file with the following contents:

:sources:
- https://rubygems.org

Make sure it works by using "gem environment" and making sure "REMOTE
SOURCES" is using the https URL.


** Changed in: ruby1.9.1 (Ubuntu)
   Status: New => Confirmed

** Changed in: ruby1.9.1 (Ubuntu)
   Importance: Undecided => Wishlist

** Changed in: ruby1.9.1 (Ubuntu)
   Importance: Wishlist => Low

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby1.9.1 in Ubuntu.
https://bugs.launchpad.net/bugs/1467716

Title:
  "gem install" fetches packages from unencrypted HTTP URL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby1.9.1/+bug/1467716/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1467716] Re: "gem install" fetches packages from unencrypted HTTP URL

2015-09-09 Thread Simon Déziel
Indeed, the gemrc way is much cleaner. Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby1.9.1 in Ubuntu.
https://bugs.launchpad.net/bugs/1467716

Title:
  "gem install" fetches packages from unencrypted HTTP URL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby1.9.1/+bug/1467716/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1467716] Re: gem install fetches packages from unencrypted HTTP URL

2015-06-26 Thread Robie Basak
Thank you for your reply. I think this bug needs further investigation
in comparing the Ubuntu packaged versions to upstream versions to figure
out if and where the gap appears.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby1.9.1 in Ubuntu.
https://bugs.launchpad.net/bugs/1467716

Title:
  gem install fetches packages from unencrypted HTTP URL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby1.9.1/+bug/1467716/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1467716] Re: gem install fetches packages from unencrypted HTTP URL

2015-06-25 Thread Simon Déziel
On 06/23/2015 05:36 AM, Robie Basak wrote:
 I know that years ago gem install was horribly insecure, but I believe
 this has been improved upstream? So is this a bug in Ubuntu's packaging,
 or is it that it is fixed in a newer upstream (and/or Ubuntu) release,
 or is what you're reporting still a problem upstream?

I'm unsure about where the problem originate. I've only tested this on
Ubuntu Trusty.

 I'll also note that using unencrypted HTTP isn't necessarily insecure.
 Cryptographic verification can be done using digital signatures outside
 the transport protocol (for example apt does this), which is arguably
 more secure because it protects data at rest as well as in transit. For
 example, even if an apt mirror is compromised the signatures and thus
 package contents cannot be since the apt repository private signing keys
 aren't held on any mirror.

You are right. In this specific case, the files are not
cryptographically signed as shown when asking for signature validation [1]:

# gem install bundler -P HighSecurity
Fetching: bundler-1.10.5.gem (100%)
ERROR:  While executing gem ... (Gem::Exception)
Unsigned gem


 Finally, HTTPS doesn't necessarily protect privacy for software
 repositories either, as any attacker who could compromise your HTTP
 download can also observe the size and timing of your HTTPS downloads
 and thus often be able to guess what packages you downloaded from a
 repository that is already public.

 So it would be useful if you could please clarify exactly what you mean
 by insecure, 

I must admit that saying that HTTP is insecure is overly broad. My
main concern was MITM attacks. I agree with you that HTTPS alone isn't a
silver bullet but it would still be an improvement security-wise.

 and what needs to be fixed in Ubuntu as opposed to what
 is available in a newer release and what needs fixing upstream.


Having gem always use the HTTPS URL to rubygems.org would be sufficient
to at least prevent MITM attacks. A quick look at the upstream git tree
showed that they use the HTTPS scheme to reach rubygems.org.

Regards,
Simon


1: http://guides.rubygems.org/security/#using-gems

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby1.9.1 in Ubuntu.
https://bugs.launchpad.net/bugs/1467716

Title:
  gem install fetches packages from unencrypted HTTP URL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby1.9.1/+bug/1467716/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1467716] Re: gem install fetches packages from unencrypted HTTP URL

2015-06-23 Thread Robie Basak
Thank you for taking the time to report this bug and helping to make
Ubuntu better.

I know that years ago gem install was horribly insecure, but I believe
this has been improved upstream? So is this a bug in Ubuntu's packaging,
or is it that it is fixed in a newer upstream (and/or Ubuntu) release,
or is what you're reporting still a problem upstream?

I'll also note that using unencrypted HTTP isn't necessarily insecure.
Cryptographic verification can be done using digital signatures outside
the transport protocol (for example apt does this), which is arguably
more secure because it protects data at rest as well as in transit. For
example, even if an apt mirror is compromised the signatures and thus
package contents cannot be since the apt repository private signing keys
aren't held on any mirror.

Finally, HTTPS doesn't necessarily protect privacy for software
repositories either, as any attacker who could compromise your HTTP
download can also observe the size and timing of your HTTPS downloads
and thus often be able to guess what packages you downloaded from a
repository that is already public.

So it would be useful if you could please clarify exactly what you mean
by insecure, and what needs to be fixed in Ubuntu as opposed to what
is available in a newer release and what needs fixing upstream.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ruby1.9.1 in Ubuntu.
https://bugs.launchpad.net/bugs/1467716

Title:
  gem install fetches packages from unencrypted HTTP URL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby1.9.1/+bug/1467716/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs