[TriLUG] Fwd: OpenSSH Security Advisory: Trojaned Distribution Files
Jonathan Rippy
jonathan.rippy at interpath.net
Thu Aug 1 14:12:20 EDT 2002
My Goal:
Reduce the risk of packages appearing in the wild that
have been compromised and go undetected.
My Proposal:
In addition to computing an MD5 checksum for the package,
additionally digitally sign the package.
Discussion:
I left out the web of trust discussion but that would of course
be needed as well. Key swapping conventions, initial system
installations, etc.. could help establish this web of trust.
But....
Let's assume everyone rushed out this second and started
digitally signing their packages. When I go to download/install
a package;
If they are in my web of trust ...
Sweet, I can now (with less risk, though not
totally eliminated) use this package. I cannot be
guaranteed that their key wasn't compromised.
else if they are not in my web of trust ...
then If I go ahead and use it anyway ...
1.) I am in the same position as if they never
signed it in the first place. Ie, blindly
trusting this package.
2.) However, if this key enters my web of trust
in the future, then I've increased my
comfort level with all the packages this
identity has signed thus far and I've installed
on my system.
Summary:
It seems to me that in the worst case it neithers help nor hurts,
but merely adds an extra layer of complexity. However, in the
best case it could decrease the risk of compromised packages
being propogated. Also, if a key is compromised, you can revoke
the key. It's all about limiting risks in my opinion.
Mike Johnson wrote:
> Jonathan Rippy [jonathan.rippy at interpath.net] wrote:
>
>
>>Personally, I think the developers should GPG sign the
>>valid distributions. Then, the tool could verify the signatures.
>>
>
> But what does this solve? You would have to trust the person that
> signed it, or someone in your web of trust would have to trust the
> signer. If I just start signing files, how do you know that you should
> trust me? If I create a new key, upload it to the keyservers, and start
> signing things, are you going to trust what I've signed? Why?
>
>
>>Does any distro do this? (I'd assume some do ... not sure off
>>the top of my head.)
>>
>
> Red Hat signs each of their RPMs. Dunno about others.
>
> Mike
>
--
jonathan rippy
More information about the TriLUG
mailing list