On Wed, Nov 13, 2013 at 02:32:29PM +0100, Sascha Peilicke wrote:
On Wednesday 13 November 2013 13:39:24 Dominique Leuenberger a.k.a. Dimstar wrote:
Quoting Sascha Peilicke <speilicke@suse.com>:
Replacing the .keyring MUST be a sensible topic for the review team (if not: we can as well remove the logic: if injecting a random keyring into the package does not result in the verification of the keyring, it's wasted space).
I fail to see why this pops up now when a .keyring was changed. Did somebody verify how those .keyring files where created in the first place? As long as we don't have an automated way to trust keyring files, we have zero security gained.
I sure hope they were verified.. otherwise you can just remove them again and consider it wasted time. We DID originally agree on a process on how to do this task.
And we also mentioned that we'd want a big red banned to warn about changes in this file.
AUTOMATED way of trusting a keyring is just plain useless... and cannot be done.. EVER! This goes against the whole web-of-trust stuff ('somewhere the trust chain has to start.. this you have to establish manually')
Others have state that the keyring files shouldn't be part of the package they're supposed to validate. Maybe only a very small set of trusted users would be allowed to change that.
That's just Jan.. and is not what was agreed on how we follow it for now. Users trust our packages... it is up to the package to establish the trust to upstream.
the .keyring file is there for the maintainer/us to be able to trust 'unknown' contributors
We only need a package with openSUSE's blessed keyring and require that for gpg-offline verification during build. Put that package into Base:System or openSUSE:Tools or wherever it's save enough and have the security team be the only maintainers. As a Factory reviewer, you would normally trust SUSE's security team and wave through changes to the keyring package.
yes, that was also discussed: but rejected due to overhead and complexity (in how to get a signed package into the dist)
Do you honestly expect external contributors to use the mechanism? For externals, the usual motivation for packaging something is to scratch some itch. I wonder if there are people out there itched by upstream tarball verification issues. If they are, they're most likely working for a consultancy or other company which is concerned about OS-level security. These guys definitely can manage to send a mail to opensuse-security@opensuse.org.
As an example, take polkit rules. They're in the hands of the sec team for good reason and are handles exactly as I proposed. So far people where able to manage that.
Do you have the ML thread ready where this was discussed?
I did not yet have time to actually do the KR validation.. but from a .changes entry, I think it's just right.
As said, I can certainly live with mentioning it. Maybe it's even a good idea. It's just not helping anybody ATM.
It helps us, the review team, to make sure that there was thought put into the change. It helps us in establishing 'trust' to the packager submitting it..
More or less, yes. Of course it's more obvious that the packager changed the keyring on purpose if he documented it. On the other hand he could have just faked the changes entry too. By mandating this, we just added process without solving the underlying issue.
So far, I'm inclined to keep my attitude, as long as the feature didn't get it's extra tuning round in the garage, I'm not gonna spend any review time on it.
In general, if the change is documented and does not look fishy, let it through. If it looks fishy, mark for review security-team This whole thing is hard to do right and we should see how this can be improved later. Ciao, Marcus -- To unsubscribe, e-mail: opensuse-security+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-security+owner@opensuse.org