1 |
Hi |
2 |
|
3 |
On Sun, Nov 07, 2004 at 03:49:22PM +0000, Kurt Lieber wrote: |
4 |
> On Sun, Nov 07, 2004 at 04:44:32PM +0100 or thereabouts, Peter Simons wrote: |
5 |
> > I think it is important to stress that everybody is on the |
6 |
> > same side here. The important thing right now is how to |
7 |
> > _fix_ this problem. As I see it, the simplest possible |
8 |
> > solution is this: |
9 |
> > (1) Run "find /usr/portage -type f | xargs sha1sum -b" on |
10 |
> > the Gentoo main system. |
11 |
> > (2) Sign the output with GPG. |
12 |
> > (3) Put it into the portage tree. |
13 |
> > (4) If the user has GPG installed and has manually put the |
14 |
> > appropriate public key in some place _outside_ of the |
15 |
> > portage tree, have "emerge sync" verify that the |
16 |
> > signature is intact and all hashes hold. |
17 |
> People place way to much reliance on GPG and other public/private key |
18 |
> systems... |
19 |
I see your message is signed :) I use the ASCII one below, he he. |
20 |
The reliance on those are justified though, I think. |
21 |
|
22 |
IMHO the weak link in security is always people and procedures, not the math |
23 |
or the crypto. This suggestion improves the procedure and lessens the |
24 |
number of people at a low cost (if the developers/sysadm in question |
25 |
agree). It could be tested, eventually made the default, and the option |
26 |
retained not to use it. That is probably crucial since some developers |
27 |
will have variations on the standard user setup. |
28 |
|
29 |
> Let's assume we implement the above steps. What does that buy you? How do |
30 |
> you know how many people have a copy of the private key used to sign that |
31 |
> data? How do you know what sort of passphrase is used on it? (or if it |
32 |
> even has a passphrase) How do you know the box that holds the private key |
33 |
> is secure? |
34 |
Gentoo publishes on their website the number of people who has this? |
35 |
|
36 |
> Most importantly, how do you know when to stop? At some point, you're |
37 |
> going to have to accept some level of risk. |
38 |
When it is too much effort for the security gain. I can't really judge, |
39 |
but the above suggestion seems easy. Security is a trafe-off, due credit |
40 |
to Bruce Schneier. It's a process, and this thread might lead to above |
41 |
implementation, after some review and discussion on list. Seems like |
42 |
meta-objection to me, one about the process, which I think actually |
43 |
works fine. That's not only why I use open source, it is why I |
44 |
aggresively advocate it. |
45 |
|
46 |
Much of this thread has been meta-discussion: Is it a problem?, should |
47 |
it be fixed?, etc. It was refreshing to see the above suggestion to a |
48 |
solution. Is it a good one? |
49 |
|
50 |
cheers, |
51 |
Jan |
52 |
-- |
53 |
.~. |
54 |
/V\ Jan Groenewald |
55 |
/( )\ http://www.aims.ac.za/ |
56 |
^^-^^ |
57 |
|
58 |
-- |
59 |
gentoo-security@g.o mailing list |