1 |
W dniu pon, 02.07.2018 o godzinie 17∶36 +0200, użytkownik Jason A. |
2 |
Donenfeld napisał: |
3 |
> Hey guys, |
4 |
> |
5 |
> While our infrastructure team has some nice technical competence, the |
6 |
> recent disaster and ongoing embarrassing aftermath has made ever more |
7 |
> urgent the need to have end-to-end signatures between developers and |
8 |
> users. While the infrastructure team seems fairly impressive at |
9 |
> deploying services and keeping the house running smoothly, I'd rather |
10 |
> we don't place additional burden on them to do everything they're |
11 |
> doing securely. Specifically, I'd like to ensure that 100% of Gentoo's |
12 |
> infrastructure can be hacked, yet not backdoor a single witting user |
13 |
> of the portage tree. Right now, as it stands, rsync distributes |
14 |
> signatures to users that are derived from some |
15 |
> infrastructure-controlled keys, not from the developers themselves. |
16 |
> |
17 |
> Proposal: |
18 |
> - Sign every file in the portage tree so that it has a corresponding |
19 |
> .asc. Repoman will need support for this. |
20 |
> - Ensure the naming scheme of portage files is sufficiently strict, so |
21 |
> that renaming or re-parenting signed files doesn't result in RCE. [*] |
22 |
> - Distribute said .asc files with rsync per usual. |
23 |
> |
24 |
|
25 |
Another problem: how do you prevent attacks based on removing files? |
26 |
For example, let's say a MITM that removes new version of some packages |
27 |
and related GLSAs in order to force the user to stay at vulnerable |
28 |
version. |
29 |
|
30 |
-- |
31 |
Best regards, |
32 |
Michał Górny |