Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upConsider providing repomd.xml hash over https #891
Comments
marmarek
assigned
rootkovska
Mar 8, 2015
marmarek
added this to the Release 2 milestone
Mar 8, 2015
marmarek
added
enhancement
C: core
P: major
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 4 Sep 2014 20:32 UTC
IMHO it can use self-signed (or private CA) certificate, specifically listed in yum settings for Qubes repositories (sslcacert option for repository definition).
|
Comment by marmarek on 4 Sep 2014 20:32 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 8 Sep 2014 09:53 UTC
Even if we wanted to use a special-purpose cert (so not-so-trusted, with priv key kept on the server) for this, the question remains about how to whitelist the CAs for yum? Without that this would be pretty meaningless...
https://groups.google.com/d/msg/qubes-users/qluZgegOnO8/odz_zxtOkkUJ
|
Comment by joanna on 8 Sep 2014 09:53 UTC https://groups.google.com/d/msg/qubes-users/qluZgegOnO8/odz_zxtOkkUJ |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 8 Sep 2014 09:59 UTC
You can provide CA whitelist per-repo, so we can simply place there self-signed cert for Qubes repositories and leave the defaults for other (Fedora) ones.
|
Comment by marmarek on 8 Sep 2014 09:59 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 8 Sep 2014 10:00 UTC |
marmarek
modified the milestones:
Release 2.1 (post R2),
Release 2
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 7, 2015
Member
Alternatively we can use signed metadata (same as Debian uses by default). This will also help with implementing updates-freeze attack detection. Details here:
https://groups.google.com/d/msgid/qubes-devel/5520B680.5030701%40whonix.org
|
Alternatively we can use signed metadata (same as Debian uses by default). This will also help with implementing updates-freeze attack detection. Details here: |
marmarek
modified the milestones:
Release 3,
Release 2.1 (post R2)
Apr 7, 2015
marmarek
modified the milestones:
Release 3.1,
Release 3.0
May 23, 2015
marmarek
referenced this issue
Sep 29, 2015
Open
Generate proper metalink for yum repositories #1254
marmarek
modified the milestones:
Release 3.2,
Release 3.1
Feb 8, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 21, 2016
Member
Just doing a routine check: Is it still correct that @rootkovska is assigned to this issue?
|
Just doing a routine check: Is it still correct that @rootkovska is assigned to this issue? |
marmarek
unassigned
rootkovska
Apr 21, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
No. |
marmarek
modified the milestones:
Release 3.2,
Release 3.2 updates
Nov 19, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Mar 26, 2018
Member
@marmarek: Is there any special reason that yum.qubes-os.org and deb.qubes-os.org use HTTP instead of HTTPS in repo definitions by default? Should we switch them all to HTTPS?
|
@marmarek: Is there any special reason that |
marmarek commentedMar 8, 2015
Reported by marmarek on 4 Sep 2014 20:30 UTC
https://groups.google.com/d/topic/qubes-devel/39k347Du_D4/discussion
This will make MITM attack at least harder. Currently (unsigned metadata downloaded over plain http) makes MITM attack trivial and user will not even get any error message when someone subvert the connection. Making it HTTPS at least will give some error message when someone will try to keep you away from updates.
Migrated-From: https://wiki.qubes-os.org/ticket/891