Summary: | Gentoo latest files are unsigned | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Patrick Schleizer <adrelanos> |
Component: | Misc | Assignee: | Gentoo Security <security> |
Status: | RESOLVED WONTFIX | ||
Severity: | normal | CC: | releng |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Patrick Schleizer
2015-02-13 10:45:27 UTC
I don't see the threat nor the gain from implementing your suggestion. Stages are a mere stepping stone to a system, we have never made the promise that what you get there is up to date. Before autobuilds, stages were up to a year old. Now with 'weekly' stages (in quotes as the process does fail at times giving you maybe two stages a month), that lack of a promise hasn't changed. You always need to update (a) your tree and (b) your packages to have an up-to-date system. The threat model you quote is from a (single) piece of software that is constantly updated, that just doesn't apply to stages. Expiring signatures sounds like something that incurs a lot of infra/releng work for little to no gain. Besides, if the mirror fiddles with the latest- files, I think we have a few other things we'd need to worry about. So: --sync && -vauDN world && glsa-check || die > Besides, if the mirror fiddles with the latest- files, I think we have a few
> other things we'd need to worry about.
What would it be?
If we do sign stage3 and portage snapshot tarballs: what is keeping us from signing the latest file, too?
> I don't see the threat
The threat is that a mirror could trick software using mirror files and relying on that latest file into using old software, e.g. a backup of a stage3 from two years ago with known vulnerability X in software Y.
(In reply to Sebastian Pipping from comment #2) > If we do sign stage3 and portage snapshot tarballs: what is keeping us from > signing the latest file, too? The fact that you gain little to nothing. (In reply to Sebastian Pipping from comment #3) > > I don't see the threat > > The threat is that a mirror could trick software using mirror files and > relying on that latest file into using old software, e.g. a backup of a > stage3 from two years ago with known vulnerability X in software Y. See c#1 on why that is not a problem. |