-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 23/01/2019 11.16 AM, Simon Gaiser wrote: > Patrick Schleizer: >> Many users already upgraded APT in a vulnerable way without ever knowing >> about this issue. > > That's probably true. OTOH if you count since the public announcement > from Debian it's only about 29 h. So I think there's also a significant > portion of users who didn't installed new packages in that time (While > apt-get update is also affected, AFAIU, unless you find another bug in > APT this does not enable code execution.). > > For those affected we at least offer fresh templates. Of course > depending on the usage of those templates recovering might still require > significant work (sanitizing/recreating affected VMs). > > And then there is of course always the possibility that somebody > discovered this bug much earlier. > >> What about introducing a security on/off switch that a subset of Qubes >> developers can trigger? > >> Before apt-get (or other package manager) does actually anything, a >> simple script could fetch a file from Qubes clearnet domain (and/or >> onion) and ask "is it currently secure to update"? > >> In most cases, the server would provide a cryptographically signed file >> by a Qubes developer which says "ok". Otherwise in situations such as >> now with APT security vulnerability DSA 4371-1 a Qubes developer could >> put a cryptographically signed file saying "not safe" there. In such >> cases, updates would be blocked until a new file is provided. > >> Things to keep in mind related to such a file: man-in-the-middle attack >> - infinite freeze atttacks; rollback attacks; perhaps more. Can think >> about this more if this sounds interesting. > >> Of course there should be options to: > >> - disable this mechanism entirely >> - manually override by user > >> These override option is useful for: > >> - to stay flexible in case of bugs of this mechanism itself and, >> - to not give Qubes developers too much power. No advanced adversary >> should be able to ask Qubes developers to remotely brick all Qubes >> installations (mostly theoretic at this point and not important for now >> but still easy to implement and good to have), >> - other unforeseeable things. > > I think blocking updates automatically is probably more problematic > than useful. But ... > >> This idea could be seen as a subset of the emergency project news >> mechanism that is currently missing in all distributions. In short: >> distributions have no mechanism to communicate with their users >> effectively in situations such as this one. More info: > >> https://www.whonix.org/wiki/Dev/project-news > > I think having something like qubes-announce directly integrated into > Qubes is a very interesting idea. (Of course implementing it safely is > tricky). > > Simon >
Related issue: "Mechanism to notify users when critical action is required" https://github.com/QubesOS/qubes-issues/issues/3430 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlxJJeMACgkQ203TvDlQ MDD3bBAAm/VlNvXQTmA/apCk3ZwWzNWqKCdawiBzjebJTjg/UDabUaZDnvihdfdf 7VGRlJIUONq0k4ddpImxv89OiklRC/VWzK7d/2t1TW+ZerN24WqRQRfSfWg/uCIz VqHj3WDJ3vPBAuBA9NqBjweisnsvi+nzvLeob/6xaYGk/Ch5Cluy2SKiNDDJip7n OkLlDcT5jB32HTzT0fHSdh+VrLGIx2Ey5sQOke2xvbF22M6wyrgcbvNcNdI5SR3I pfLP+XGrbwrhMDSZdhtGiWwaSYp77FYlcUqY2GC9IoyrjGg0pAyBDwpJSQqzVAFG Zti+2sHaVqt9rVhc0JigcC96I4Z16xH7cmjQto9mtfTqCxUX0W0+zds0xiPOvuA3 342ZxHfbTIVfWWORbq9LYAdLCqHUyXRBKH7rqke8M0XMlRAMoUJ0OOsN5dLyR6JJ ChiYCNlGpPQDOsHCKANR2fhEks1BxQJq7G3T4yHWd8cCITHhArty6A270aOO1H2v O51jWRCd7WKPJXm4Z+EpDr+bqqRvzMv9RBQ/3i51sk0HocSBb6jJ3N9RzxlmVmOk t5XTtY4X+aKrXScz4Z3v0AhgJDulqYhtelZ995B5WOh9F3+BwRQHgqwnHGx3C0dI IqlpWxmKbJ4wAMbFWQDTJvDduupDqV/XL5eT5hYBKkZNFQGcZwM= =J40i -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To post to this group, send email to qubes-devel@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/5951eeb2-0afe-2e3a-c329-6c817852e7a1%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.