-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Download release checksums via trusted connection #43
Comments
is there a specific reason the images aren't downloaded https to begin with? |
FreeBSD must have recently enabled encryption on download.freebsd.org - I can't remember this to be there when I started working on fetch! For HardenedBSD I can't find encrypted resources at this time. |
not very hardened, imo then 😝 |
I would not consider downloading from https very secure either. It's just protecting against the simplest network attacks to compromise downloaded releases. (Btw. we do have checks of downloaded assets so that they do not compromise the host) I would prefer to ship libiocage with a signed set of release hashes. They don't change that often and in case there is an unknown one, we can offer manual input and print a link to our issue tracker with a text snippet ready to copy/paste. We can even setup monitoring that watches MANIFEST files on the release servers for changes. |
In irc.freenode.net #hardehedbsd @xmj mentioned we should look at the way hbsd-update update verifies the signatures. unbound-host gave me some result, but I could not find a way to verify the txz assets from such keys. Here's an example from a test host:
Another thin I've noticed is the MANIFEST.asc file among the build assets. We could use that to verify the signatures file for HardenedBSD. No progress on FreeBSD signature verification yet. |
In the meanwhile HardenedBSD assets are also fetched via encrypted connection. Manual specification of hashes is still outstanding. |
Releases are entirely downloaded and updated involving the trust chain and signatures obtained via HTTPS. There is still need to manually override signatures and to skip verification at all, but it is a different concern than this issue aimed to be. |
The manifest containing the release asset signatures is downloaded from the same untrusted http resource as the assets. To be an effective security feature we need to verify this signatures from trusted sources.
CLI
--verify/--no-verify
option--signatures base=62acaee7e...
or similar)Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.
The text was updated successfully, but these errors were encountered: