On Mon, 30 Mar 2015 05:37:01 +0000 (UTC) Duncan wrote:
> Andrew Savchenko posted on Sun, 29 Mar 2015 21:04:52 +0300 as excerpted:
> 
> > On Sun, 29 Mar 2015 19:52:38 +0200 Sebastian Pipping wrote:
> >> On 29.03.2015 19:39, Andrew Savchenko wrote:
> >> > On Sun, 29 Mar 2015 18:41:33 +0200 Sebastian Pipping wrote:
> >> >> So I would like to propose that
> >> >> 
> >> >> * support for Git access through https:// is activated,
> >> >> 
> >> >> * Git access through http:// and git:// is deactivated, and
> >> > 
> >> > Some people have https blocked. http:// and git:// must be available
> >> > read-only.
> >> 
> >> They would not do online banking over http, right?  Why would they run
> >> code with root privileges from http?
> > 
> > Gentoo tree access is not even near on the same security scale as online
> > banking.
> 
> The point is, if the gentoo tree is compromised and you install from it, 
> everything you run including that online banking is now effectively 
> compromised, so it most certainly *IS* at the same security scale as that 
> online banking.  Weakest link in the chain and all that...

The Gentoo tree is not verified anyway: mirrors distribute it via
http, rsync and ftp. And using https for that will create a
tremendous stress on mirror's CPUs, so this is a bad approach.
Not to mention that https itself is very hapless protocol with tons
of vulnerabilities (all SSL versions are affected and most TLS
implementations).

A proper solution will be to use cryptographic verification of
downloaded files. Right now we have signed manifests and manifests
can be used to verify all other data (ebuilds, distfiles, patches
and so on). This is much more reliable solution, since it allows to
verify data integrity even for compromised data channels or any
infrastructure part not related to keys distribution or signing.

What we really need is a tool to do such verification. This is work
in progress now afaik.

Best regards,
Andrew Savchenko

Attachment: pgp2NewmxTXpU.pgp
Description: PGP signature

Reply via email to