Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 577548 - Publish full GPG keys over HTTPS
Summary: Publish full GPG keys over HTTPS
Status: RESOLVED FIXED
Alias: None
Product: Websites
Classification: Unclassified
Component: Gentoo Website (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Release Team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-03-16 14:00 UTC by Eduard - Gabriel Munteanu
Modified: 2022-04-09 16:57 UTC (History)
7 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Eduard - Gabriel Munteanu 2016-03-16 14:00:02 UTC
https://www.gentoo.org/downloads/signatures/ currently provides fingerprints and
key IDs for the signing keys, which users are instructed to retrieve from a
keyserver. However, GPG fingerprints are merely SHA1 hashes, making
key verification the weakest link in the chain. The TLS certificate,
image hashes and their signatures are already SHA256.

SHA1 is fairly weak nowadays. Fingerprint checking is more of a
stop-gap measure than best practice.

That being said, I urge you to publish the full keys on that page.
This ensures a trust chain at least as good as SHA256, which is very
reasonable for 2016. Users should not rely on checking fingerprints
for keys retrieved over insecure channels.

Reproducible: Always
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2016-03-26 11:41:37 UTC
Signatures are mainly RelEng territory, www just has a copy of the current signatures.

We'll stay on CC if anything from us is needed.
Comment 2 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2018-09-23 17:40:11 UTC
The full keys are available over HTTPS for a long time:
https://qa-reports.gentoo.org/output/service-keys.gpg

jstein:
Add a link to them?
Comment 3 Jonas Stein gentoo-dev 2018-09-23 22:51:29 UTC
great, that sounds good to me.
Comment 4 Kristian Fiskerstrand (RETIRED) gentoo-dev 2018-09-23 22:56:54 UTC
(In reply to Eduard - Gabriel Munteanu from comment #0)
> https://www.gentoo.org/downloads/signatures/ currently provides fingerprints
> and
> key IDs for the signing keys, which users are instructed to retrieve from a
> keyserver. However, GPG fingerprints are merely SHA1 hashes, making
> key verification the weakest link in the chain. The TLS certificate,
>

Just to have it mentioned int he discussion; a 2nd preimage attack on SHA1 is a very different story than a collission attack.
Comment 5 Brian Dolbec (RETIRED) gentoo-dev 2018-09-27 12:06:48 UTC
They are also available as a full keyring in the tree with a manifest confirming the validiy of the download in app-crypt/gentoo-keys
Comment 6 Eduard - Gabriel Munteanu 2018-09-29 15:57:55 UTC
(In reply to Brian Dolbec from comment #5)
> They are also available as a full keyring in the tree with a manifest
> confirming the validiy of the download in app-crypt/gentoo-keys

The primary usecase is to allow all users, including new users or those who don't already have a Gentoo installed close by, to verify downloads easily.
Comment 7 B.D. 2019-02-23 23:24:51 UTC
> The primary usecase is to allow all users, including new users or those who don't already have a Gentoo installed close by, to verify downloads easily.

As one such user, I found it ridiculous to be presented both a stage 3 tarball and its accompanying PGP signature over unsecured HTTP.  Here is the offending page, linked from <https://gentoo.org/downloads/>:

http://distfiles.gentoo.org/releases/amd64/autobuilds/current-stage3-amd64/

Is this considered a separate issue?
Comment 8 Alec Warner (RETIRED) archtester gentoo-dev Security 2019-02-24 00:25:37 UTC
(In reply to B.D. from comment #7)
> > The primary usecase is to allow all users, including new users or those who don't already have a Gentoo installed close by, to verify downloads easily.
> 
> As one such user, I found it ridiculous to be presented both a stage 3
> tarball and its accompanying PGP signature over unsecured HTTP.  Here is the
> offending page, linked from <https://gentoo.org/downloads/>:
> 
> http://distfiles.gentoo.org/releases/amd64/autobuilds/current-stage3-amd64/
> 
> Is this considered a separate issue?

I'm not sure I understand your concerns around the http content, can you provide more detail?

-A
Comment 9 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-02-24 08:46:42 UTC
(In reply to B.D. from comment #7)
> > The primary usecase is to allow all users, including new users or those who don't already have a Gentoo installed close by, to verify downloads easily.
> 
> As one such user, I found it ridiculous to be presented both a stage 3
> tarball and its accompanying PGP signature over unsecured HTTP.  Here is the
> offending page, linked from <https://gentoo.org/downloads/>:
> 
> http://distfiles.gentoo.org/releases/amd64/autobuilds/current-stage3-amd64/
> 
> Is this considered a separate issue?

Yes, it is separate but no, it is not an issue.  The files are provided via third-party mirrors, so TLS certificates do not provide any advantage towards verifying the authenticity of the contents.
Comment 10 Andreas K. Hüttel archtester gentoo-dev 2022-04-09 16:57:08 UTC
The keys are now also published via WKD on https://www.gentoo.org/ , so I guess we can close this.