1 |
I've lost track on where we are on this thread. |
2 |
|
3 |
That said -- there is a perfectly good standard for signing and |
4 |
verifying files in large-scale collections of code. It's called a |
5 |
signed JAR file. The 'jarsigner -verify my.jar' command works very |
6 |
nicely. |
7 |
|
8 |
http://java.sun.com/j2se/1.3/docs/guide/jar/jar.html |
9 |
|
10 |
The file format itself is ZIP rather than tar or gzip. |
11 |
|
12 |
Peter -- I appreciate your efforts to raise the visibility of this |
13 |
issue. |
14 |
|
15 |
Andrew Jaquith |
16 |
Senior Project Manager |
17 |
Symantec Professional Services |
18 |
196 Broadway |
19 |
Cambridge, MA 02139 |
20 |
USA |
21 |
|
22 |
Direct: 617.768.2711 |
23 |
Mobile: 617.501.3278 |
24 |
Fax: 617.621.1478 |
25 |
Email: ajaquith@×××××××.com |
26 |
PGP key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x898CF546 |
27 |
On Nov 8, 2004, at 10:02 AM, Peter Simons wrote: |
28 |
|
29 |
> Brian G Peterson writes: |
30 |
> |
31 |
>> I assume that you intend to 'blow the whistle' because |
32 |
>> you are incapable or unwilling to submit a patch for the |
33 |
>> issue yourself? |
34 |
> |
35 |
> If you read the recent messages carefully, you'll find that |
36 |
> I have tried _numerous_ times to provide details how to |
37 |
> remedy the situation. |
38 |
> |
39 |
> |
40 |
>> I agree that there is a lot of room for improvement in |
41 |
>> the portage security system. |
42 |
> |
43 |
> Then why don't we stop discussing what I know or don't know, |
44 |
> do or won't do, and talk about a solution? The vast majority |
45 |
> of text posted in this thread is concerned with all kinds of |
46 |
> things BUT finding a good, technical solution to a |
47 |
> vulnerability that _does_ exist. |
48 |
> |
49 |
> Generating a signed hash list of all files is really not |
50 |
> that difficult. It would solve the problem in a matter of |
51 |
> hours for those who are concerned about it, and it would |
52 |
> probably set things in motion for a better solution to be |
53 |
> developed that solves the problem for all users as well as |
54 |
> possible. |
55 |
> |
56 |
> So why is the Gentoo team so incredibly reluctant to do |
57 |
> anything about it? |
58 |
> |
59 |
> Again: |
60 |
> |
61 |
> (1) Configure your main site to update the portage tree |
62 |
> from CVS in a time interval that's sufficient large to |
63 |
> allow for the hash list to be generated. Someone else |
64 |
> already suggested once an hour. I can't say what is |
65 |
> appropriate since I don't know your setup. |
66 |
> |
67 |
> (2) Calculate hashes for all files in the /usr/portage |
68 |
> hierarchy. One could probably use a trivial Makefile to |
69 |
> generate hashes incrementally, even, to ease the load |
70 |
> on the machine. |
71 |
> |
72 |
> (3) Sign the hash file with a GPG key. That means that |
73 |
> either someone has to enter the pass phrase manually, |
74 |
> or you'll have to set up a pass phrase agent, or you'll |
75 |
> have to use a key without a password at all. |
76 |
> |
77 |
> Everything but the first solution is sub-optimal but |
78 |
> still a _lot_ better than what we have now. If someone |
79 |
> manages to compromise the main site, we all have far |
80 |
> greater problems than a lost secret key, so even _if_ |
81 |
> the pass phrase is empty we still gain security. |
82 |
> |
83 |
> (4) Distribute the signed hash file with the portage tree. |
84 |
> |
85 |
> (5) Provide scripts that verify the integrity of the tree |
86 |
> after an emerge sync _before_ any other code is run |
87 |
> that has been obtained from the network. |
88 |
> |
89 |
> (6) Make the matching public key available on the key |
90 |
> servers, on the web site, and every other place that |
91 |
> you can think about. Give an expiry date of, say 3 |
92 |
> months to make clear that this is an intermediate |
93 |
> solution that will change. |
94 |
> |
95 |
> (7) Get as many people to sign the key as possible to |
96 |
> properly authenticate it. |
97 |
> |
98 |
> (8) Write a security advisory that educates the users about |
99 |
> the problem. |
100 |
> |
101 |
> Peter |
102 |
> |
103 |
> |
104 |
> -- |
105 |
> gentoo-security@g.o mailing list |
106 |
> |
107 |
|
108 |
|
109 |
-- |
110 |
gentoo-security@g.o mailing list |