On Mon, Nov 18, 2013 at 05:07:08PM -0200, Giancarlo Razzolini wrote: > One thing I've been doing is using dnscrypt, because my ISP did use > transparent dns proxying
Nice! I use DNSCurve. > Now, I'd like to ask why the openbsd infrastructure servers (www, > anoncvs, packages), do not make use of SSL certs, SSHFP DNS records, > etc. One of the recent changes of OpenSSH was to trust SSHFP records by > default when the domain zone is using DNSSEC. But the main anoncvs > server, which is the source of all code, do not have such record. DNSSEC is a massive outage risk, is fragile, and attracts DDoS due to record sizes. You say you are concerned about spying (me too). If the concern is over a global, *passive* adversary, then DNSSEC doesn't solve anything, since DNSSEC is not encrypted. Instead it glues you into a system that seems to have gone out of its way to allow surveillance. > Not even on the anoncvs page there isn't the fingerprint published. http://www.openbsd.org/anoncvs.html Fingerprints for most servers are listed. > I know that the most secure way is to buy the CD's and use then. But > what about the errata patches? Errata patches are included in the -stable branch. > And security related packages updates? Security updates are in ports but not packages. You can see recent updates including to ports here: https://twitter.com/OpenBSD_stable > None of those can be reliably verified. I know and use the binpatches + > packages updates from M:Tier. But the trust is placed on a third party, > not on the OpenBSD project itself. Great job M:Tier, by the way. It's worth noting that M:Tier employs at least one OpenBSD developer, so it's not like they're a random organization that just happens to be trustworthy. :) > But if we could at least verify the signature with an OpenBSD provided > cert that is installed with the release itself, this would be awesome. This could be relatively easy for AnonCVS. For AnonCVS maintainers who support it, key fingerprints could be listed in a local file for easy comparison. (The blunt approach would be to pre-populate root's known keys, but that could provoke irritation for various reasons.) I recall a previous discussion about signing packages (did you check the archives?) and it sounded like it would be a lot of work that developers were not keen on. > Anyway, these are just suggestions, and I would be happy to help > implement them. What you guys think? Implement something on your own, pretending your server(s) are responsible for OpenBSD's http, ftp, anoncvs, etc. Then show (not say) how you did it and that it works correctly with real OpenBSD machines of various configurations. That will get more attention. Actually this should always be the route for making suggestions. DIY and then show and tell. Nicolai