Re: Signing Packages.gz

2000-04-03 Thread Robert Bihlmeyer
Anthony Towns writes: > Users don't have enough information to make such a decision, however. > How do they know if James allowed a particular NMU to be made, [...] It would probably be better to let this essential package be maintained by a small team. Three or four people would suffice to lowe

Re: Signing Packages.gz

2000-04-03 Thread Marcus Brinkmann
On Mon, Apr 03, 2000 at 01:36:01PM +1000, Anthony Towns wrote: > > Debian *can* make this decision, because we know each other. Most users > can only go `James who?'. This is easily identified as a play with names. Who is this "Debian" person you refer to anyway? After all, behind every action is

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Mon, Apr 03, 2000 at 12:49:24PM +0200, Robert Bihlmeyer wrote: > > As I understand it, you can't actually *obtain* the keys, you can just > > *use* them. Often though, this is just as good. > Yes. "Snarf" was the wrong word. Just being able to use them while the > user is connected restricts you

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
27;^telnetd' Packages | cut -d\ -f2` MD5b=`md5sum telnetd.deb | cut -d\ -f1` if [ "$MD5a" = "$MD5b" ]; then echo "MD5sum match" else echo "MD5sum mismatch :(" fi As

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Mon, Apr 03, 2000 at 12:02:29PM +0200, Marcus Brinkmann wrote: > > But they could be, with minimal changes. Stick the latest .changes files > > in debian/changes somewhere and add some code to apt to get it. > The changes file would be sufficient, but it is not ideal, because it > always signs a

Re: Signing Packages.gz

2000-04-03 Thread Robert Bihlmeyer
Anthony Towns writes: > On Sun, Apr 02, 2000 at 07:44:56PM +0200, Robert Bihlmeyer wrote: > > Note that *any* keys that your agent holds can be snarfed by the > > admin(s) of any hosts where you ssh-in with agent forwarding enabled. > > As I understand it, you can't actually *obtain* the keys, y

Re: Signing Packages.gz

2000-04-03 Thread Marcus Brinkmann
On Sun, Apr 02, 2000 at 02:30:12PM -0600, Jason Gunthorpe wrote: > On Sun, 2 Apr 2000, Marcus Brinkmann wrote: > > > This is a seperate problem. I agree that this should not be the case, but it > > has no place in this discussion. If individual developer keys are > > compromised, we have a problem

Re: Signing Packages.gz

2000-04-03 Thread Marcus Brinkmann
On Sun, Apr 02, 2000 at 08:11:15PM +0200, Torsten Landschoff wrote: > > We might want to revoke the old key. If James leaves we can't revoke his key > because it is HIS key. We can however revoke the dinstall key because it > is by definition Debian's key. But this is nitpicking. Who is Debian?

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Mon, Apr 03, 2000 at 10:24:02AM +0200, Robert Bihlmeyer wrote: > Nicolás Lichtmaier <[EMAIL PROTECTED]> writes: > > All packages can run things as root. Even the most simple game. > Doing clandestine things in a install-script is harder than in a > binary. #!/bin/sh /usr/games/mygame --update-

Re: Signing Packages.gz

2000-04-03 Thread Marcus Brinkmann
On Mon, Apr 03, 2000 at 01:01:30PM +1000, Anthony Towns wrote: > On Sun, Apr 02, 2000 at 02:57:06PM +0200, Marcus Brinkmann wrote: > > > > As dinstall verifies the keys on the packages (which already exist, btw, > > > > they are just not propagated), it puts itself in the middle of the > > > > cha

Re: Signing Packages.gz

2000-04-03 Thread Robert Bihlmeyer
Nicolás Lichtmaier <[EMAIL PROTECTED]> writes: > All packages can run things as root. Even the most simple game. Doing clandestine things in a install-script is harder than in a binary. -- Robbe

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Sun, Apr 02, 2000 at 06:52:37PM +0200, Robert Bihlmeyer wrote: > > It's currently the case, yes, but it *could* be changed. You could, > > for example setup dinstall so that it wouldn't accept NMUs of certain > > important packages (such as gnupg). > A good idea. Still: with package-granularity,

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Sun, Apr 02, 2000 at 07:44:56PM +0200, Robert Bihlmeyer wrote: > Note that *any* keys that your agent holds can be snarfed by the > admin(s) of any hosts where you ssh-in with agent forwarding enabled. As I understand it, you can't actually *obtain* the keys, you can just *use* them. Often thou

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Sun, Apr 02, 2000 at 01:00:56PM +0200, Bart Schuller wrote: > On Sun, Apr 02, 2000 at 02:46:30PM +1000, Anthony Towns wrote: > > PGP (v2.x, I'm not uptodate with the recent OpenPGP stuff), generates a > > secret (albeit symmetric, rather than public/private keypair) IDEA key > > everytime you tr

Re: Signing Packages.gz

2000-04-03 Thread Anthony Towns
On Sun, Apr 02, 2000 at 02:57:06PM +0200, Marcus Brinkmann wrote: > > > As dinstall verifies the keys on the packages (which already exist, btw, > > > they are just not propagated), it puts itself in the middle of the chain: > > Well, as Jason points out, they are propogated: by the -devel-changes

Re: Signing Packages.gz

2000-04-03 Thread Nicolás Lichtmaier
> I partly concur. Even if the developer->user channel was completely > secured by signatures et al, we would still have the problem of an > attacker gaining very much by breaking into a single developer's > machine. You're netbase package is a good example: it contains a > couple of programs usual

Re: Signing Packages.gz

2000-04-02 Thread Chris Frey
Chris Frey wrote: > I'm curious how this issue is going to be handled now that it has been > discussed. (The archives don't seem to be seeing any new messages on this > topic.) What has to occur before this cryptographic signing of > Packages actually happens? Oops, the recent mail archive upda

Re: Signing Packages.gz

2000-04-02 Thread Jason Gunthorpe
On Sun, 2 Apr 2000, Marcus Brinkmann wrote: > This is a seperate problem. I agree that this should not be the case, but it > has no place in this discussion. If individual developer keys are > compromised, we have a problem no matter what. Developers should not store > secret keys on net connecte

Re: Signing Packages.gz

2000-04-02 Thread Torsten Landschoff
Hi Marcus, On Sun, Apr 02, 2000 at 02:32:04PM +0200, Marcus Brinkmann wrote: > > No, the user cannot verify that. The user can check the signature against > > our keyring but they have no idea who *should* have signed it. > > It seems to be hard to understand, so I will explain it one more time

Re: Signing Packages.gz

2000-04-02 Thread Jason Gunthorpe
On 2 Apr 2000, Robert Bihlmeyer wrote: > > Solution: remove the identity from .ssh/authorized_keys on my home > > machine. > Note that *any* keys that your agent holds can be snarfed by the > admin(s) of any hosts where you ssh-in with agent forwarding enabled. No, that is the point of ssh-age

Re: Signing Packages.gz

2000-04-02 Thread Robert Bihlmeyer
Julian Gilbey <[EMAIL PROTECTED]> writes: > On my home machine, I have an identity in .ssh/identity.pub. > I copied that into .ssh/authorized_keys on master (possibly using the > LDAP system). > I *also* copied it into .ssh/authorized_keys on my home machine. > > That extra copy on my home machin

Re: Signing Packages.gz

2000-04-02 Thread Robert Bihlmeyer
Anthony Towns writes: > There is an existing single-point vulnerability in *every* > mirror. Compromise the mirror and you can compromise every single Debian > user who upgrades from that mirror. You don't even have to try touching > anything at *.debian.org. Yes, and I'd very much see this vuln

Re: Signing Packages.gz

2000-04-02 Thread Torsten Landschoff
On Sat, Apr 01, 2000 at 10:48:54PM +0200, Marcus Brinkmann wrote: > No. Currently there is NO chain of verification (I should not have said > "trust", it's the wrong term. Sorry). So you agree that it would be an improvement? > However, it doesn't establish a complete chain of verification from

Re: Signing Packages.gz

2000-04-02 Thread Julian Gilbey
On Sat, Apr 01, 2000 at 04:56:59PM -0700, Jason Gunthorpe wrote: > > On Sun, 2 Apr 2000, Julian Gilbey wrote: > > > On Sat, Apr 01, 2000 at 03:16:23PM -0700, Jason Gunthorpe wrote: > > > How many people > > > foward ssh agents and put that key in their home .ssh/authorized_keys? > > > > What doe

Re: Signing Packages.gz

2000-04-02 Thread Marcus Brinkmann
Hi, On Sun, Apr 02, 2000 at 01:33:53PM +1000, Anthony Towns wrote: > > As dinstall verifies the keys on the packages (which already exist, btw, > > they are just not propagated), it puts itself in the middle of the chain: > > Well, as Jason points out, they are propogated: by the -devel-changes >

Re: Signing Packages.gz

2000-04-02 Thread Marcus Brinkmann
On Sat, Apr 01, 2000 at 03:18:17PM -0700, Jason Gunthorpe wrote: > > Now link 2. It is currently absent. What you seem to suggest is to add a key > > (dinstall-key) here, so the user can verify the archive. This adds a point > > of weakness. As the dinstall key can't be used automatically and kept

Re: Signing Packages.gz

2000-04-02 Thread Marcus Brinkmann
On Sat, Apr 01, 2000 at 03:16:23PM -0700, Jason Gunthorpe wrote: > > On Sat, 1 Apr 2000, Marcus Brinkmann wrote: > > > Wrong. If you have signed debs, and you are careful when updating the > > debian-keyring package, there is no risk even if master is compromised. > > Hahha! > > Sorry, your are

Re: Signing Packages.gz

2000-04-02 Thread Marcus Brinkmann
On Sat, Apr 01, 2000 at 02:49:40PM -0700, Jason Gunthorpe wrote: > > On Sat, 1 Apr 2000, Marcus Brinkmann wrote: > > > In the signed .debs case, I, as a developer, assert that the package comes > > from me. A user can directly verify this by checking the signature. > > No, the user cannot verify

Re: Signing Packages.gz

2000-04-02 Thread Marcus Brinkmann
On Sun, Apr 02, 2000 at 01:36:56PM +1000, Anthony Towns wrote: > On Sat, Apr 01, 2000 at 03:38:29PM +0200, Marcus Brinkmann wrote: > > I could not trust either. The former, because it is stored on a network > > connected machine, the latter because it is transfered over the net (if it > > is shared

Re: Signing Packages.gz

2000-04-02 Thread Bart Schuller
On Sun, Apr 02, 2000 at 02:46:30PM +1000, Anthony Towns wrote: > PGP (v2.x, I'm not uptodate with the recent OpenPGP stuff), generates a > secret (albeit symmetric, rather than public/private keypair) IDEA key > everytime you try to encrpt a message. It encrypts the message with this > key, then en

Re: Signing Packages.gz

2000-04-02 Thread Anthony Towns
On Sat, Apr 01, 2000 at 10:36:44PM -0600, Zed Pobre wrote: > > Also, what's so fundamentally wrong with transferring a secret key over > > the net? Hint: PGP does it every time you send an encrypted email. > Either you are using the phrase "secret key" in a context with > which I am unfamiliar,

Re: Signing Packages.gz

2000-04-02 Thread Anthony Towns
On Sat, Apr 01, 2000 at 03:38:29PM +0200, Marcus Brinkmann wrote: > I could not trust either. The former, because it is stored on a network > connected machine, the latter because it is transfered over the net (if it > is shared among the security team). Of course, if the security team use > their

Re: Signing Packages.gz

2000-04-02 Thread Anthony Towns
On Sat, Apr 01, 2000 at 04:00:20PM +0200, Marcus Brinkmann wrote: > On Sat, Apr 01, 2000 at 12:55:53PM +1000, Anthony Towns wrote: > > But unfortunately that's not quite the choice I have either, since for > > some reason that I can't fathom, people seem to think that a dinstall > > key would be an

Re: Signing Packages.gz

2000-04-02 Thread Jason Gunthorpe
On Sun, 2 Apr 2000, Julian Gilbey wrote: > On Sat, Apr 01, 2000 at 03:16:23PM -0700, Jason Gunthorpe wrote: > > How many people > > foward ssh agents and put that key in their home .ssh/authorized_keys? > > What does that mean? It could easily be that I am doing something > wrong without even r

Re: Signing Packages.gz

2000-04-01 Thread Julian Gilbey
On Sat, Apr 01, 2000 at 03:16:23PM -0700, Jason Gunthorpe wrote: > How many people > foward ssh agents and put that key in their home .ssh/authorized_keys? What does that mean? It could easily be that I am doing something wrong without even realising it Julian -- =-=-=-=-=-=-=-=-=-=-=-=

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Marcus Brinkmann wrote: > We already use link 1 (signed changes files), and trust it. This won't > be changed by either proposal. Yes, even in the signed packages file you > trust all developers keys. We only trust link1 due to the vigilance of our FTP masters and people read

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Marcus Brinkmann wrote: > Wrong. If you have signed debs, and you are careful when updating the > debian-keyring package, there is no risk even if master is compromised. Hahha! Sorry, your are deluded if you belive this :> Seriously, if someone can hack master we are all vun

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Marcus Brinkmann wrote: > In the signed .debs case, I, as a developer, assert that the package comes > from me. A user can directly verify this by checking the signature. No, the user cannot verify that. The user can check the signature against our keyring but they have no id

Re: Signing Packages.gz

2000-04-01 Thread Marcus Brinkmann
ackages case > > adds a further point of weakness to the chain of trust. > > Interesting. So signing Packages.gz will lower the security? No. Currently there is NO chain of verification (I should not have said "trust", it's the wrong term. Sorry). However, it doesn

Re: Signing Packages.gz

2000-04-01 Thread Torsten Landschoff
On Sat, Apr 01, 2000 at 04:00:20PM +0200, Marcus Brinkmann wrote: > It seems you feel personally insulted. I am sorry for this, but > unfortunately it doesn't change the situation that the signed packages case > adds a further point of weakness to the chain of trust. Interesti

Re: Signing Packages.gz

2000-04-01 Thread Marcus Brinkmann
On Tue, Mar 28, 2000 at 12:41:22AM -0500, Chris Frey wrote: > > Quoting from the mailing list archives... :-) > > Marcus Brinkmann <[EMAIL PROTECTED]> wrote: > > On Sun, Mar 26, 2000 at 09:00:34AM +1000, Anthony Towns wrote: > > > The whole file --- verifying each entry would take at least three

Re: Signing Packages.gz

2000-04-01 Thread Marcus Brinkmann
Hi, On Sat, Apr 01, 2000 at 12:55:53PM +1000, Anthony Towns wrote: > But unfortunately that's not quite the choice I have either, since for > some reason that I can't fathom, people seem to think that a dinstall > key would be an abomination to man and God and I'd probably be summarily > kicked ou

Re: Signing Packages.gz

2000-04-01 Thread Marcus Brinkmann
On Fri, Mar 31, 2000 at 08:22:14PM -0700, Jason Gunthorpe wrote: > You are wrong about signed .debs vs signed package files. Signed .debs are > not worth the bytes to transfer a signature and the time check it. Their > only real use is to check the master archive against hack/corruption and > even

Re: Signing Packages.gz

2000-04-01 Thread Chris Frey
Hi, I'm curious how this issue is going to be handled now that it has been discussed. (The archives don't seem to be seeing any new messages on this topic.) What has to occur before this cryptographic signing of Packages actually happens? Does it need to become part of policy? (in which case I

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Anthony Towns wrote: > Why would verifying a new security-key necessarily be significantly harder > than verifying a new unstable-key, though? In both cases you only really > want to check that its signed by the previous security-key. But in the other case it replaces/augemen

Re: Signing Packages.gz

2000-04-01 Thread Anthony Towns
On Fri, Mar 31, 2000 at 09:31:31PM -0700, Jason Gunthorpe wrote: > On Sat, 1 Apr 2000, Anthony Towns wrote: > > * the web of trust, and having the ftp-team sign it > The average user has no entry to the web of trust, so this is just as > useless. (and massively involved for our poor end user)

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Anthony Towns wrote: > * the web of trust, and having the ftp-team sign it The average user has no entry to the web of trust, so this is just as useless. (and massively involved for our poor end user) > * putting a fingerprint on the website and in Debian books,

Re: Signing Packages.gz

2000-04-01 Thread Anthony Towns
On Fri, Mar 31, 2000 at 08:22:14PM -0700, Jason Gunthorpe wrote: > How exactly do you propose to transfer a verification key to the clients? > I can't think of any decent way to do this that isn't prone to some kind > of hack-a-mirror thing or involves annoying extra steps. Just about everything i

Re: Signing Packages.gz

2000-04-01 Thread Jason Gunthorpe
On Sat, 1 Apr 2000, Anthony Towns wrote: > I'm not sure why this isn't getting through. Automatically, cavalierly > signing Packages.gz on master *HAS DEFINITE GAINS OVER THE PRESENT WAY > OF DOING THINGS*. How exactly do you propose to transfer a verification key to the cli

Re: Signing Packages.gz

2000-04-01 Thread Anthony Towns
On Sat, Apr 01, 2000 at 12:15:01PM +1000, Anthony Towns wrote: (among many other minor typos) > You can differentiated probably good but outdated old packages, and probably ^^ This should read "can't differentiate". Whoops. > bad but outdated old packages, no. On the upsi

Re: Signing Packages.gz

2000-04-01 Thread Anthony Towns
it to people, and they'll legitimately think you've revoked your key. > Note that this would not have a theoretic advantage, > because the user would still have to update his information about trusted > keys from some other site (pgp key server). It would just add some > redu

Re: Signing Packages.gz

2000-03-31 Thread Marcus Brinkmann
Hi Anthony, On Mon, Mar 27, 2000 at 08:37:10AM +1000, Anthony Towns wrote: > On Sun, Mar 26, 2000 at 04:02:20PM +0200, Marcus Brinkmann wrote: > > On Sun, Mar 26, 2000 at 09:00:34AM +1000, Anthony Towns wrote: > > > The whole file --- verifying each entry would take at least three minutes > > > on

Re: Signing Packages.gz

2000-03-30 Thread Anthony Towns
On Wed, Mar 29, 2000 at 01:12:39PM +0200, Robert Bihlmeyer wrote: > > Well, it'd be nice to be able to do so, to verify that a mirror hasn't > > been compromised, but no, you're right. > Actually I don't care that much if the mirror is compromised, if it > affects only packages that I don't install

Re: Signing Packages.gz

2000-03-29 Thread Robert Bihlmeyer
Anthony Towns writes: > Well, it'd be nice to be able to do so, to verify that a mirror hasn't > been compromised, but no, you're right. Actually I don't care that much if the mirror is compromised, if it affects only packages that I don't install. If it affects some of those packages, I will no

Re: Signing Packages.gz

2000-03-29 Thread Chris Frey
Robert Bihlmeyer <[EMAIL PROTECTED]> wrote: > That's just the point: the security of a singly-signed Packages.gz > would not be much higher than that of the ftp sites themselves. > Nothing to win, here. Actually I'm not concerned right now with the security of the main debian ftp site. While tha

Re: Signing Packages.gz

2000-03-28 Thread Branden Robinson
On Tue, Mar 28, 2000 at 12:43:32AM +1000, Anthony Towns wrote: > Actually, now I think about it, the Packages file itself is valuable > information. Consider a Packages file that doesn't actually changes the > .deb's, but changes the netbase entry, say to read: > > Package: netbase > D

Re: Signing Packages.gz

2000-03-28 Thread Chris Frey
Quoting from the mailing list archives... :-) Marcus Brinkmann <[EMAIL PROTECTED]> wrote: > On Sun, Mar 26, 2000 at 09:00:34AM +1000, Anthony Towns wrote: > > The whole file --- verifying each entry would take at least three minutes > > I don't think it is useful to sign the Packages file, becau

Re: Signing Packages.gz

2000-03-27 Thread Anthony Towns
On Mon, Mar 27, 2000 at 01:42:47AM +0200, Robert Bihlmeyer wrote: > There is no need to check all of [the packages] Well, it'd be nice to be able to do so, to verify that a mirror hasn't been compromised, but no, you're right. Actually, now I think about it, the Packages file itself is valuable i

Re: Signing Packages.gz

2000-03-27 Thread Anthony Towns
On Mon, Mar 27, 2000 at 12:17:47PM +0200, Robert Bihlmeyer wrote: > Anthony Towns writes: > > The only reason not to trust a key dinstall uses explicitly for signing > > Packages is if you believe dinstall is compromised. If you believe that, > > then you shouldn't be downloading .deb's *ever*, be

Re: Signing Packages.gz

2000-03-27 Thread Robert Bihlmeyer
Anthony Towns writes: > The only reason not to trust a key dinstall uses explicitly for signing > Packages is if you believe dinstall is compromised. If you believe that, > then you shouldn't be downloading .deb's *ever*, because you're immediately > running *untrusted* scripts as root on your sy

Re: Signing Packages.gz

2000-03-26 Thread Robert Bihlmeyer
Anthony Towns writes: > On Sat, Mar 25, 2000 at 11:03:11PM +0100, Robert Bihlmeyer wrote: > > Do you want to sign each package entry, or the whole file? > > The whole file --- verifying each entry would take at least three minutes > on my hardware, and god knows how long on anything moderately o

Re: Signing Packages.gz

2000-03-26 Thread Anthony Towns
On Sun, Mar 26, 2000 at 04:02:20PM +0200, Marcus Brinkmann wrote: > On Sun, Mar 26, 2000 at 09:00:34AM +1000, Anthony Towns wrote: > > The whole file --- verifying each entry would take at least three minutes > > on my hardware, and god knows how long on anything moderately old or > > outdated. I c

Re: Signing Packages.gz

2000-03-26 Thread Marcus Brinkmann
On Sun, Mar 26, 2000 at 09:00:34AM +1000, Anthony Towns wrote: > The whole file --- verifying each entry would take at least three minutes > on my hardware, and god knows how long on anything moderately old or > outdated. I certainly wouldn't want to try it on m68k on a regular basis, > eg. (If doi

Re: Signing Packages.gz

2000-03-26 Thread Chris Frey
On Sat, Mar 25, 2000 at 11:03:11PM +0100, Robert Bihlmeyer wrote: > Chris Frey <[EMAIL PROTECTED]> writes: > > > So my question is, what are your thoughts on adding a signature to the > > current Packages.gz file, or adding a similar *dsc file for it, > > which is then signed? > > Do you want to

Re: Signing Packages.gz

2000-03-25 Thread Anthony Towns
On Sat, Mar 25, 2000 at 11:03:11PM +0100, Robert Bihlmeyer wrote: > Chris Frey <[EMAIL PROTECTED]> writes: > > So my question is, what are your thoughts on adding a signature to the > > current Packages.gz file, or adding a similar *dsc file for it, > > which is then signed? > Do you want to sign

Re: Signing Packages.gz

2000-03-25 Thread Robert Bihlmeyer
Chris Frey <[EMAIL PROTECTED]> writes: > So my question is, what are your thoughts on adding a signature to the > current Packages.gz file, or adding a similar *dsc file for it, > which is then signed? Do you want to sign each package entry, or the whole file? Whose signature would be used? > T

Signing Packages.gz

2000-03-24 Thread Chris Frey
Hi, To my understanding the package process is fairly secure on the incoming side of Debian's package managment system. Maintainers sign their uploads which prevents a man-in-the-middle attack. These packages are then checksumed in Packages.gz, but nowhere is that file signed, that I know of. T