On Mon, Feb 05, 2024 at 08:49:09AM +0100, Simon Josefsson wrote:
> Bill Allombert <ballo...@debian.org> writes:
> 
> > Le Thu, Feb 01, 2024 at 10:38:03AM +0100, Simon Josefsson a écrit :
> >> Hi
> >> 
> >> I'm exploring how to defend against an attacker who can create valid
> >> signatures for cryptographic private keys (e.g., PGP) that users need to
> >> trust when using an operating system such as Debian.  A signature like
> >> that can be used in a targetted attacks against one victim.
> >> 
> >> For example, apt does not have any protection against this threat
> >> scenario, 
> >
> > Is not apt-key a protection ?
> 
> No, the current implementation protects against missing and/or invalid
> signatures.  Compare how in the WebPKI world some CA issued a valid
> *.google.com certificate, and how that (and other incidents) lead to
> setup of Certificate Transparency, which helps mitigate these issues.

The difference is that with apt-key, the list of valid public keys is stored on
the user system (in /etc/apt/trusted.gpg.d/), not a list of root certificates,
and that the users are notified when the keys are updated, which is not the
case with CA.  Nobody can generate a new signature that will be accepted by
apt-key out of the box.

Cheers,
-- 
Bill. <ballo...@debian.org>

Imagine a large red swirl here. 

Reply via email to