On 01/01/14 21:23, iyCXLONo mVUTxeyv wrote:
> Hello,
> 
> Is it possible to download OpenWrt binaries over HTTPS?  If not, which seems 
> to be the case, I want to suggest that HTTPS for downloads is needed.  The 
> HTTP downloads are at risk of man-in-the-middle attacks.  For instance, 
> compromised binaries could be supplied in response to HTTP download requests. 
>  Also, downloads could be eavesdropped to learn the hardware of a downloader, 
> which increases the risk of the downloader to targeted attack.
> 
> If this seems like a paranoid concern, it was reported a few days ago that 
> the NSA is building a network of hacked routers across the globe as part of 
> its QFIRE program [1].  Given the general state of consumer router security, 
> it seems unlikely that intelligence agencies are targeting specifically 
> OpenWrt downloads, but we know both that routers are a target and that HTTP 
> downloads are a vulnerability, which amounts to a real risk for OpenWrt users.
> 
> A Trac ticket from April exists for HTTPS downloads, but it has not gotten 
> much attention [2].
> 
> [1] http://cryptome.org/2013/12/appelbaum-30c3.pdf, slide 18
> [2] https://dev.openwrt.org/ticket/13346
> 


Hi there,
As the person who submitted 13346, I'd like to add an 'update' at least
to this list of my current thoughts in light of recent information
releases by such people as Snowden and Appelbaum as well as what was
published in Der Spiegel (I would cite, but [a] it's early in the
morning and I'm lazy, but moreso [b] by now I figure anyone following
this thread now or in the future will be reasonably well informed of the
generality of the information released rather than who released what).
Once I get some coffee in to me, I'll update the trac entry with
something very close to the following:
----

tl;dr - Some of the serious brains at the IETF think the Internet is
probably broken beyond repair and needs re-engineering. There's no way
for a reasonably well informed person to conclude otherwise. An
inability to fully trust initial downloads creates a dangerous false
sense of security of any subsequent updates.

Detail:
There are some problems even with https downloads, as described (albeit
for another distro, but the bug entry has some good discussion in it
that should get a reader thinking about how to get bootloaders and the
like to trust keys/certificates as well as revocations etc. ) [1] Note
it's 'oldest-bug-evar' alias and report date of 1999. Can't recall if
it's mentioned there, but one way to alleviate that is to use some sort
of signed BIOS system, effectively how MS use UEFI. The problems of Open
Source on UEFI is well documented, I shan't cite here suffice to say
there's a very large chicken and egg problem.

I believe if we, as the online commmunity with an interest in this area,
consider how we can trust boot loaders to correctly handle Keys and
Certificates, along with OpenPGP KeyID problems as described [2] and I
do not think it is clear how 'ultra-paranoid' or even 'reasonably
paranoid' end users can currently verify how they can relatively easily
initially 'trust' upstream anything these days without 'positive
biometric feedback indicators'.

Finally, as an aside, given it's been shown that certain Government
agencies are capable of intercepting WiFi signals over 10 kilometers
away with 'NIGHTSTAND' technology[3]

I believe these sorts of issues are precisely the sort of things that
the IETF are looking to address in their 'perpass' discussion[4] of
which there has been much debate[5]

Those still reading and with a interest of where the online community
may need to go in the future, could do far worse than read Phillip
Hallam-Baker's draft about a 'PRISM Proof email' system[6] in
particularly his points raised about 'Policy, Audit and Transparency'.

I think the best the paranoid can hope for is vetting and building code
locally and hope their build machines and production systems haven't
been physically intercepted at some stage.

Cheers,

Pete.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=998
[2] http://debian-administration.org/users/dkg/weblog/105
[3]
http://www.engadget.com/2013/12/30/nsa-can-hack-wifi-devices-from-eight-miles-away/
[4] https://www.ietf.org/mailman/listinfo/perpass
[5]
http://policyreview.info/articles/news/technical-community-debates-over-taking-back-internet/215
[6] https://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt

----

Coffee sourced, I've edited this a bit. I realise it's a bit clumsy, but
to close off:
I'm happy for vendors to acknowledge the issues involved, but I'm highly
dubious of any suggestion that provides what the 'paranoid' seek because
the underlying infrastructure of The Internet is incapable of providing
what is needed for them.

If vendors close such tickets with a 'WONTFIX' or even 'NOTABUG', I can
understand, however I'd like to think vendors will leave such tickets
open so that if a serious proposed resolution is found in the future the
existing problems can be easily checked off.

Must dash, all the best,


Pete.
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to