On 18/09/2008, Hiram Chirino <[EMAIL PROTECTED]> wrote:
> On Thu, Sep 18, 2008 at 10:59 AM, sebb <[EMAIL PROTECTED]> wrote:
>  > On 18/09/2008, Hiram Chirino <[EMAIL PROTECTED]> wrote:
>  >> On Wed, Sep 17, 2008 at 9:42 PM, William A. Rowe, Jr.
>  >>
>  >> <[EMAIL PROTECTED]> wrote:
>  >>
>  >> > Similarly, the issue of signature validation is a significant flaw which
>  >>  > I also hope maven addresses even more promptly, and which they are 
> aware
>  >>  > of.  The alternatives are to take down maven until it is secure, or to
>  >>  > continue to populate maven with various released artifacts.  And this 
> too
>  >>  > isn't germane to the question above, which is;
>  >>
>  >>
>  >> The signature validation issue has a simple fix which I have already
>  >>  mentioned earlier.  I'm not sure why folks continue to think it's
>  >>  still a problem.  All the projects need to do is enable a checksum
>  >>  validation plugin, and at least that problem is resolved.
>  >>
>  >
>  > Not sure I agree that the checksum plugin solves the problem.
>  >
>  > As far as I can tell, all that the plugin does is to detect any
>  > changes to dependencies that occur *after the checksum list is
>  > initially generated*
>
>
> Agreed.
>
>
>  >
>  > Unless I'm mistaken, it does not guard against the orignal dependency
>  > already being corrupt, nor does it protect the product itself.
>  >
>
>
> So the responsibility is still on us, the upstream distributor, to
>  verify the the checksums we list in our source distro are correct.

And how do we do that?
We cannot use the Maven repo as it has already been compromised.

>  But at least by doing this, down stream users of our source distros
>  can rest assured that the dependencies that they are using are the
>  correct ones.

Only if our distro has not had its checksum list hacked.

>  If a committer by mistake adds an invalid checksum for an artifact
>  that he been hacked in his repo, hopefully, another developer doing
>  the build will notice that the build fails due to checksum error if he
>  has the valid artifact.  At that point they can investigate who has
>  the valid copy of the artifact.  The more users that are building the
>  software with the checksum validation, the better of chance you got at
>  some one noticing a hacked repo artifact.

Depends on when the hacked version was uploaded.
It's quite possible that every ASF use of the module will be after the
original hack.

>  If by chance all repos being used only have the hacked version of the
>  artifact and, no one notices it hacked and we release with that.. then
>  that would be a serious issue yes.  I think we should handle that like

Which is what we should protect against from the start.

>  we would handle any serious security flaw in our products.  Re-release
>  with the flaw (checksum) corrected and advise all our users to
>  upgrade.
>
>  On a side note.. a GPG web of trust would help in trusting the
>  original binary checksum.  Note that down stream users of our source
>  distro may not trust people we trust, so they may want those checksums
>  anyways.

How? By signing the checksum?
If so, fine, but then why not just sign the jar.

>
>  > What's to stop the checksum list being corrupted?

Any comment on this?

>  >
>  >>
>  >>  --
>  >>  Regards,
>  >>  Hiram
>  >>
>  >>  Blog: http://hiramchirino.com
>  >>
>  >>  Open Source SOA
>  >>  http://open.iona.com
>  >>
>  >>  ---------------------------------------------------------------------
>  >>
>  >> To unsubscribe, e-mail: [EMAIL PROTECTED]
>  >>  For additional commands, e-mail: [EMAIL PROTECTED]
>  >>
>  >>
>  >
>  > ---------------------------------------------------------------------
>  > To unsubscribe, e-mail: [EMAIL PROTECTED]
>  > For additional commands, e-mail: [EMAIL PROTECTED]
>  >
>  >
>
>
>
>
> --
>
> Regards,
>  Hiram
>
>  Blog: http://hiramchirino.com
>
>  Open Source SOA
>  http://open.iona.com
>
>  ---------------------------------------------------------------------
>  To unsubscribe, e-mail: [EMAIL PROTECTED]
>  For additional commands, e-mail: [EMAIL PROTECTED]
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to