Re: Compromising Debian Repositories

2013-08-23 Thread Neil McGovern
On Thu, Aug 22, 2013 at 06:11:35PM -0400, Paul Henning wrote: > Nope, not gonna do that. He can come right out and deny it himself, so it's > on record. He's had weeks to do it and except for one personal reply has > been tight lipped about it. Furthermore, I'm curious how that sabotage got > by f

Re: Compromising Debian Repositories

2013-08-22 Thread Paul Henning
Nope, not gonna do that. He can come right out and deny it himself, so it's on record. He's had weeks to do it and except for one personal reply has been tight lipped about it. Furthermore, I'm curious how that sabotage got by for 2+ years (thanks for correcting me Kurt) before it was discovered?

Re: Compromising Debian Repositories

2013-08-22 Thread kloschi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Probably parts of the answer lie in deterministic builds, see below. hth. best, kloschi - Original Message Subject: [liberationtech] Deterministic Builds Part One: Cyberwar and Global Compromise Date: Thu, 22 Aug 2013 10:39:56 +00

Re: Compromising Debian Repositories

2013-08-22 Thread adrelanos
Timo Juhani Lindfors: > adrelanos writes: >> Some Debian maintainers are working on deterministic builds, although >> they call it reproducible builds, that's great! Link: >> https://wiki.debian.org/ReproducibleBuilds > > Terminology is hard :) As mentioned in the bof we can make sure that the >

Re: Compromising Debian Repositories

2013-08-22 Thread Jonathan Wiltshire
On 2013-08-05 22:07, Paul Henning wrote: he was either threatened or paid - probably the latter - to cripple the entropy on by the NSA, and they've had a war on randomness for a long time now. That is an extremely serious accusation and one that you haven't backed up at all. If you hold some e

Re: Compromising Debian Repositories

2013-08-21 Thread Timo Juhani Lindfors
adrelanos writes: > Some Debian maintainers are working on deterministic builds, although > they call it reproducible builds, that's great! Link: > https://wiki.debian.org/ReproducibleBuilds Terminology is hard :) As mentioned in the bof we can make sure that the build is deterministic or we can

Re: Compromising Debian Repositories

2013-08-21 Thread adrelanos
Just wanted to share news on this topic. Why are deterministic builds important? Mike Perry from The Tor Project wrote a blog post: https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise Some Debian maintainers are working on deterministic builds, although t

Re: Compromising Debian Repositories

2013-08-07 Thread Michael Stone
On Wed, Aug 07, 2013 at 05:26:24PM +0100, Daniel Sousa wrote: I think most of you are foccusing in servers running Debian, but when I asked the question I was thinking about personal computers. For example, if there are any vulnerabilities on ssh, they won't be able to get into my computer anyway

Re: Compromising Debian Repositories

2013-08-07 Thread Daniel Sousa
On Mon, Aug 5, 2013 at 9:17 AM, intrigeri wrote: > I need a reality check, as it's unclear to me what are the goals of > this discussion. I don't think there are any goals. I asked it just to understand if it would be possible to do what I was thinking (apparently, it is) and the discussion con

Re: Compromising Debian Repositories

2013-08-07 Thread Holger Levsen
Hi Paul, On Montag, 5. August 2013, Paul Henning wrote: > Yes, kick Kurt Roeckx from his admin privileges to start. It's the easiest > most basic thing you can do. [more FUD deleted] are you paid by some three or four letter agency to spread FUD? cheers & sorry, I couldnt resist, Holger

Re: Compromising Debian Repositories

2013-08-06 Thread sp113438
On Sat, 3 Aug 2013 10:48:52 +0200 Paul Wise wrote: > On Sat, Aug 3, 2013 at 10:14 AM, Daniel Sousa wrote: > > > I was reading this [1] article and it brought a question do my > > mind: How hard would it be for the FBI or the NSA or the CIA to > > have a couple of agents infiltrated as package ma

Re: Compromising Debian Repositories

2013-08-06 Thread Michael Stone
On Mon, Aug 05, 2013 at 09:11:21PM +0100, Joe wrote: I don't think there is a goal, I think we are all ruefully conceding that the much-vaunted Open Source process is simply unable to deliver trustworthy code, since the process of compiling the Open Sources to binary involves using utterly un-aud

Re: Compromising Debian Repositories

2013-08-05 Thread Rick Moen
Quoting Paul Henning (vxbin...@gmail.com): > Yes, kick Kurt Roeckx from his admin privileges to start. It's the easiest > most basic thing you can do. Zero tolerance for crippling software like he > did and it should go for everyone, lest you want another scandal. He still > maintains the critical

Re: Compromising Debian Repositories

2013-08-05 Thread Scott Leggett
On 05/08/13 18:17, intrigeri wrote: > Hi, > > I need a reality check, as it's unclear to me what are the goals of > this discussion. > > Does anyone involved plan to work on improving things, and then we're > discussing where it would be best to focus their energy? If that's the > case, then I su

Re: Compromising Debian Repositories

2013-08-05 Thread Kurt Roeckx
On Mon, Aug 05, 2013 at 05:07:20PM -0400, Paul Henning wrote: > > Yes, kick Kurt Roeckx from his admin privileges to start. [...] > And not just for OpenSSL, he > contributes to ntp as well. You forget that I also have access to all the buildds. Kurt -- To UNSUBSCRIBE, email to debian-secur

Re: Compromising Debian Repositories

2013-08-05 Thread Paul Henning
intrigeri wrote: >Does anyone involved plan to work on improving things, and then we're discussing where it would be best to focus their energy? Yes, kick Kurt Roeckx from his admin privileges to start. It's the easiest most basic thing you can do. Zero tolerance for crippling software like he di

Re: Compromising Debian Repositories

2013-08-05 Thread Joe
On Mon, 05 Aug 2013 10:17:05 +0200 intrigeri wrote: > Hi, > > I need a reality check, as it's unclear to me what are the goals of > this discussion. > > Does anyone involved plan to work on improving things, and then we're > discussing where it would be best to focus their energy? If that's the

Re: Compromising Debian Repositories

2013-08-05 Thread intrigeri
Hi, I need a reality check, as it's unclear to me what are the goals of this discussion. Does anyone involved plan to work on improving things, and then we're discussing where it would be best to focus their energy? If that's the case, then I suggest we try to design solutions with baby steps tha

Re: Compromising Debian Repositories

2013-08-04 Thread adrelanos
Daniel Sousa: > On Sun, Aug 4, 2013 at 2:55 PM, Michael Stone wrote: > >> On Sun, Aug 04, 2013 at 10:12:40AM +0200, Heimo Stranner wrote: >> >>> I think the real issue is about if the malicious patch is not part of >>> the source package >>> >> >> Why? It certainly makes your argument simpler if

Re: Compromising Debian Repositories

2013-08-04 Thread adrelanos
Michael Stone: > On Sun, Aug 04, 2013 at 10:12:40AM +0200, Heimo Stranner wrote: >> I think the real issue is about if the malicious patch is not part of >> the source package > > Why? It certainly makes your argument simpler if you arbitrarily > restrict the problem set, but it isn't obvious that

Re: Compromising Debian Repositories

2013-08-04 Thread Michael Stone
On Sun, Aug 04, 2013 at 05:13:51PM +0100, Daniel Sousa wrote: First of all, they could apply that change (calling it a patch was not one of my greatest ideas) for every update they do, it's not necesserily a one time thing. It's also much easier (and probably much dangerous) to write some code th

Re: Compromising Debian Repositories

2013-08-04 Thread Daniel Sousa
On Sun, Aug 4, 2013 at 2:55 PM, Michael Stone wrote: > On Sun, Aug 04, 2013 at 10:12:40AM +0200, Heimo Stranner wrote: > >> I think the real issue is about if the malicious patch is not part of >> the source package >> > > Why? It certainly makes your argument simpler if you arbitrarily restrict

Re: Compromising Debian Repositories

2013-08-04 Thread Michael Stone
On Sun, Aug 04, 2013 at 10:12:40AM +0200, Heimo Stranner wrote: I think the real issue is about if the malicious patch is not part of the source package Why? It certainly makes your argument simpler if you arbitrarily restrict the problem set, but it isn't obvious that it makes sense. If I wa

Re: Compromising Debian Repositories

2013-08-04 Thread Volker Birk
On Sun, Aug 04, 2013 at 02:25:03PM +0200, Jann Horn wrote: > On Sun, Aug 04, 2013 at 10:51:08AM +0200, Volker Birk wrote: > > Now I'm surprised ;-) I think, this is not a matter of security of > > checksums here. Of course, only a digital signature will do, or at least > > a MAC. > Huh, what? Aren'

Re: Compromising Debian Repositories

2013-08-04 Thread Daniel Sousa
I am really sorry if you think it's rude to start a topic here without subscribing. I thought that it was acceptable, since a lot of people do it in debian-users (I know it has a lot more volume than this one) and it's the default action when you click on "Reply to All" in most clients (well, proba

Re: Compromising Debian Repositories

2013-08-04 Thread Jann Horn
On Sun, Aug 04, 2013 at 10:51:08AM +0200, Volker Birk wrote: > Now I'm surprised ;-) I think, this is not a matter of security of > checksums here. Of course, only a digital signature will do, or at least > a MAC. Huh, what? Aren't MACs always symmetric? How do MACs fit in here? signature.asc De

Re: Compromising Debian Repositories

2013-08-04 Thread adrelanos
Volker Birk: > On Sun, Aug 04, 2013 at 03:04:33AM +, adrelanos wrote: >> Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: >>> There will be the correct checksum, if the maintainer of the package >>> does it. >> Why? > > How and by whom are checksums defined? Please hav

Re: Compromising Debian Repositories

2013-08-04 Thread adrelanos
Heimo Stranner: > On 2013-08-04 09:50, intrigeri wrote: >> Hi, >> >> adrelanos wrote (04 Aug 2013 03:04:33 GMT) : >>> Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: > Volker Birk: >> On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: >>> That should hel

Re: Compromising Debian Repositories

2013-08-04 Thread adrelanos
intrigeri: > Hi, > > adrelanos wrote (04 Aug 2013 03:04:33 GMT) : >> Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: Volker Birk: > On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: >> That should help to defeat any kind of sophisticated backdoor on b

Re: Compromising Debian Repositories

2013-08-04 Thread Riku Valli
On 08/04/2013 11:51 AM, Volker Birk wrote: > To make that clear: I don't think this is a matter of security of > the procedure what we're discussing. It is a matter of trusting > the involved people. > > Yours, VB. Exactly, problem is similar as trusted certificate authors were for ssl certific

Re: Compromising Debian Repositories

2013-08-04 Thread Heimo Stranner
On 2013-08-04 09:50, intrigeri wrote: > Hi, > > adrelanos wrote (04 Aug 2013 03:04:33 GMT) : >> Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: Volker Birk: > On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: >> That should help to defeat any kind of s

Re: Compromising Debian Repositories

2013-08-04 Thread Volker Birk
On Sun, Aug 04, 2013 at 03:04:33AM +, adrelanos wrote: > Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: > > There will be the correct checksum, if the maintainer of the package > > does it. > Why? How and by whom are checksums defined? > > And if you're taking the bu

Re: Compromising Debian Repositories

2013-08-04 Thread intrigeri
Hi, adrelanos wrote (04 Aug 2013 03:04:33 GMT) : > Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: >>> Volker Birk: On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: > That should help to defeat any kind of sophisticated backdoor on build > machines.

Re: Compromising Debian Repositories

2013-08-03 Thread adrelanos
Robert Tomsick: > On 08/03/13 13:36, Rick Moen wrote: >> Quoting Volker Birk (v...@pibit.ch): >> >>> Really? >>> >>> How do you detect, if maintainer's patches contain backdoors? If I would >>> want to attack Debian, I would try to become the maintainer of one of >>> the most harmless, most used pa

Re: Compromising Debian Repositories

2013-08-03 Thread adrelanos
Volker Birk:> On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: >> Volker Birk: >>> On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: That should help to defeat any kind of sophisticated backdoor on build machines. >>> Really? >>> How do you detect, if maintainer's patch

Re: Compromising Debian Repositories

2013-08-03 Thread Nick Boyce
On Saturday 03 Aug 2013 20:33:03 Robert Tomsick wrote: > On 08/03/13 13:36, Rick Moen wrote: [...] > > Indeed, this whole line of query (from someone who cannot even bother to > > read debian-legal and wants to be CCed; no thanks) is basically pretty > > dumb [...] > > I'm not sure that hostility

Re: Compromising Debian Repositories

2013-08-03 Thread Henrique de Moraes Holschuh
On Sat, 03 Aug 2013, Volker Birk wrote: > On Sat, Aug 03, 2013 at 08:46:53PM +1000, Aníbal Monsalve Salazar wrote: > > On Sat, Aug 03, 2013 at 12:17:06PM +0200, Volker Birk wrote: > > > Not to mention the build tool chains. > > It reminds me of Ken Thompson's article Reflections on Trusting Trust.

Re: Compromising Debian Repositories

2013-08-03 Thread Robert Tomsick
On 08/03/13 13:36, Rick Moen wrote: > Quoting Volker Birk (v...@pibit.ch): > >> Really? >> >> How do you detect, if maintainer's patches contain backdoors? If I would >> want to attack Debian, I would try to become the maintainer of one of >> the most harmless, most used packages. And believe me,

Re: Compromising Debian Repositories

2013-08-03 Thread Rick Moen
Quoting Volker Birk (v...@pibit.ch): > Really? > > How do you detect, if maintainer's patches contain backdoors? If I would > want to attack Debian, I would try to become the maintainer of one of > the most harmless, most used packages. And believe me, you wouldn't see > at the first glance, that

Re: Compromising Debian Repositories

2013-08-03 Thread Volker Birk
On Sat, Aug 03, 2013 at 08:46:53PM +1000, Aníbal Monsalve Salazar wrote: > On Sat, Aug 03, 2013 at 12:17:06PM +0200, Volker Birk wrote: > > Not to mention the build tool chains. > It reminds me of Ken Thompson's article Reflections on Trusting Trust. Yes, that's what I'm alluding to. For attacking

Re: Compromising Debian Repositories

2013-08-03 Thread Volker Birk
On Sat, Aug 03, 2013 at 10:38:34AM +, adrelanos wrote: > Volker Birk: > > On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: > >> That should help to defeat any kind of sophisticated backdoor on build > >> machines. > > Really? > > How do you detect, if maintainer's patches contain back

Re: Compromising Debian Repositories

2013-08-03 Thread Aníbal Monsalve Salazar
On Sat, Aug 03, 2013 at 12:17:06PM +0200, Volker Birk wrote: > Not to mention the build tool chains. It reminds me of Ken Thompson's article Reflections on Trusting Trust. In which he explains how to train the C compiler. http://cm.bell-labs.com/who/ken/trust.html "The moral is obvious. You ca

Re: Compromising Debian Repositories

2013-08-03 Thread adrelanos
Volker Birk: > On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: >> That should help to defeat any kind of sophisticated backdoor on build >> machines. > > Really? > > How do you detect, if maintainer's patches contain backdoors? Someone else builds the same package (binary) and detects

Re: Compromising Debian Repositories

2013-08-03 Thread Volker Birk
On Sat, Aug 03, 2013 at 09:16:40AM +, adrelanos wrote: > That should help to defeat any kind of sophisticated backdoor on build > machines. Really? How do you detect, if maintainer's patches contain backdoors? If I would want to attack Debian, I would try to become the maintainer of one of th

Re: Compromising Debian Repositories

2013-08-03 Thread adrelanos
I think deterministic builds would be the best answer to ensure in long term being free of backdoors. A deterministic build process to allows multiple builders to create identical binaries. This allows multiple parties to sign the resulting binaries, guaranteeing that the binaries and tool chain w

Re: Compromising Debian Repositories

2013-08-03 Thread Paul Wise
On Sat, Aug 3, 2013 at 10:14 AM, Daniel Sousa wrote: > I was reading this [1] article and it brought a question do my mind: How > hard would it be for the FBI or the NSA or the CIA to have a couple of > agents infiltrated as package mantainers and seeding compromised packages to > the official rep

Compromising Debian Repositories

2013-08-03 Thread Daniel Sousa
I was reading this [1] article and it brought a question do my mind: How hard would it be for the FBI or the NSA or the CIA to have a couple of agents infiltrated as package mantainers and seeding compromised packages to the official repositories? Could they submit an uncompromised source and keep