[Bug 1358272] Re: [MIR] debsig-verify

2017-08-23 Thread Michael Vogt
With the phasing out of click packages this is no longer needed and the bug can be closed. ** Changed in: debsig-verify (Ubuntu) Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-20 Thread Colin Watson
Seth Arnold wrote: debsig-verify uses some library routines from dpkg; while I inspected these calls and didn't see a problem, I must point out that dpkg was only ever designed to handle packages that already passed the usual hash-and-signatures check provided by apt and may not be suitable

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-20 Thread Michael Vogt
@Seth: thanks for comment #4 about the 32bit issue with off_t - is there any downside of simply using -D_FILE_OFFSET_BITS=64 to morph off_t into a 64bit type? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-20 Thread Seth Arnold
Colin, you're right -- and I thought about that before hitting 'Post Comment' -- but the world was different then, we still used telnet, rsh, and ftp. Installing a package in those days made an explicit decision to trust that package with root shell privileges and allowed it to install setuid or

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-20 Thread Seth Arnold
Michael, I think your proposed -D_FILE_OFFSET_BITS=64 is sufficient and probably more reliable than trying to prevent ar_size based int32 overflows or just stopping an infinite loop through other constraints. Probably someone will want to package a data file larger than two gigabytes anyway.

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-19 Thread Seth Arnold
I reviewed debsig-verify version 0.10 as checked into utopic. This shouldn't be considered a full security audit, but rather a quick gauge of maintainability. debsig-verify is awkward. Extensive use is made of global state and much of the program logic depends upon side-effects to this global

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-19 Thread Michael Vogt
Thanks Seth for your excellent review. I addressed most of your points in https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=758615 that contains patches to improve the error handling and to get rid of the global state. The tests in http://bazaar.launchpad.net/~click-

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-19 Thread Seth Arnold
findMember() on 32-bit platforms can also suffer an infinite loop and probably worse outcomes. The off_t is a 32-bit value on 32-bit platforms with a maximum value of 2147483647; the maximum value stored in the ar_size member can be 99. This allows ample opportunities for mischief, the

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-19 Thread Michael Vogt
The CFLAGS from the Makefile are overriden during the build, see: https://launchpadlibrarian.net/181033234/buildlog_ubuntu-utopic-amd64.debsig-verify_0.10_UPLOADING.txt.gz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-18 Thread Michael Vogt
** Description changed: In order to check the signature of click package we want to use the debsig-verify tool. Because clicks and debs are similar we can use debsig-verify with a appropriate policy to do the verifications. This MIR covers the tool itself, the policy will be put into a

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-18 Thread Michael Terry
Needs a team bug subscriber, but besides that looks good. The many years without a maintainer are also troubling, but at least there's one now. Assigning to security team for a quick look to verify that the code can be relied on. ** Changed in: debsig-verify (Ubuntu) Status: New =

[Bug 1358272] Re: [MIR] debsig-verify

2014-08-18 Thread Jamie Strandboge
** Changed in: debsig-verify (Ubuntu) Assignee: Ubuntu Security Team (ubuntu-security) = Seth Arnold (seth-arnold) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1358272 Title: [MIR]