Gentoo Archives: gentoo-security

From: Jan Groenewald <jan@×××××××.za>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Re: Trojan for Gentoo, part 2
Date: Sun, 07 Nov 2004 16:02:23
Message-Id: 20041107160151.GA18996@aims.ac.za
In Reply to: Re: [gentoo-security] Re: Trojan for Gentoo, part 2 by Kurt Lieber
1 Hi
2
3 On Sun, Nov 07, 2004 at 03:49:22PM +0000, Kurt Lieber wrote:
4 > On Sun, Nov 07, 2004 at 04:44:32PM +0100 or thereabouts, Peter Simons wrote:
5 > > I think it is important to stress that everybody is on the
6 > > same side here. The important thing right now is how to
7 > > _fix_ this problem. As I see it, the simplest possible
8 > > solution is this:
9 > > (1) Run "find /usr/portage -type f | xargs sha1sum -b" on
10 > > the Gentoo main system.
11 > > (2) Sign the output with GPG.
12 > > (3) Put it into the portage tree.
13 > > (4) If the user has GPG installed and has manually put the
14 > > appropriate public key in some place _outside_ of the
15 > > portage tree, have "emerge sync" verify that the
16 > > signature is intact and all hashes hold.
17 > People place way to much reliance on GPG and other public/private key
18 > systems...
19 I see your message is signed :) I use the ASCII one below, he he.
20 The reliance on those are justified though, I think.
21
22 IMHO the weak link in security is always people and procedures, not the math
23 or the crypto. This suggestion improves the procedure and lessens the
24 number of people at a low cost (if the developers/sysadm in question
25 agree). It could be tested, eventually made the default, and the option
26 retained not to use it. That is probably crucial since some developers
27 will have variations on the standard user setup.
28
29 > Let's assume we implement the above steps. What does that buy you? How do
30 > you know how many people have a copy of the private key used to sign that
31 > data? How do you know what sort of passphrase is used on it? (or if it
32 > even has a passphrase) How do you know the box that holds the private key
33 > is secure?
34 Gentoo publishes on their website the number of people who has this?
35
36 > Most importantly, how do you know when to stop? At some point, you're
37 > going to have to accept some level of risk.
38 When it is too much effort for the security gain. I can't really judge,
39 but the above suggestion seems easy. Security is a trafe-off, due credit
40 to Bruce Schneier. It's a process, and this thread might lead to above
41 implementation, after some review and discussion on list. Seems like
42 meta-objection to me, one about the process, which I think actually
43 works fine. That's not only why I use open source, it is why I
44 aggresively advocate it.
45
46 Much of this thread has been meta-discussion: Is it a problem?, should
47 it be fixed?, etc. It was refreshing to see the above suggestion to a
48 solution. Is it a good one?
49
50 cheers,
51 Jan
52 --
53 .~.
54 /V\ Jan Groenewald
55 /( )\ http://www.aims.ac.za/
56 ^^-^^
57
58 --
59 gentoo-security@g.o mailing list