Secrecy and user trust
Bill Davidsen
davidsen at tmr.com
Thu Sep 4 21:06:53 UTC 2008
Patrick O'Callaghan wrote:
> On Thu, 2008-09-04 at 23:12 +0800, Ed Greshko wrote:
>> Patrick O'Callaghan wrote:
>>>> NAK - if a fake public key were distributed then packages signed with
>>>> the fake key would be matched, allowing full access to install crap in
>>>> your machine.
>>>>
>>> True.
>>>
>> Actually I don't understand the paragraph above. It seems to be saying
>> that packages would be signed with a public key which can't be done.
>> So, the person making that statement needs to clarify.
>
> Which is the point I made earlier.
>
>>>> And packages signed with any valid redhat key would be
>>>> rejected.
>>>>
>>> Which is what I said. Thus it would be noticed immediately.
>>>
>> No, they would not be rejected as long as you still have Red Hat's
>> public key installed on your system. You can determine what public keys
>> are on your system by "rpm -qa gpg-pubkey*".
>>
>> When an rpm is signed it is signed with a private key and information
>> about the corresponding public key is placed in the rpm file. That
>> information is used to retrieve the correct public key for
>> verification. So, as long as you've not deleted it, they will verify.
>
> The hypothetical scenario being discussed is that you have already
> replaced the former (good but now possibly suspect) public key with a
> spurious new one. If that were to happen, you would be in danger of
> accepting trojanned packages signed with this new fake key. My point is
> that you would also *reject* packages signed with the new good key, and
> this would be noticed very quickly (basically the next time you did an
> update).
>
That's exactly right, and why the public key should be as trustworthy as
possible, because once you accept a single trojanned package you may
either suffer damage immediately, or have some part of the "next time
you did an update" fail. Imagine a slight change to updated so it never
tells you there *is* an update.
I am making the point that an improved method of checking the new key is
desirable, technically possible, and that a false package could cause
problems in a very short time, and might be able to hide thereafter.
--
Bill Davidsen <davidsen at tmr.com>
"We have more to fear from the bungling of the incompetent than from
the machinations of the wicked." - from Slashdot
More information about the fedora-list
mailing list