Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Jan 2003 08:59:39 -0800
From:      David Schultz <dschultz@uclink.Berkeley.EDU>
To:        "Nathan J. Yoder" <njyoder@gummibears.nu>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: digital signatures for downloads
Message-ID:  <20030113165939.GA7457@HAL9000.homeunix.com>
In-Reply-To: <6121584208.20030113005107@gummibears.nu>
References:  <6121584208.20030113005107@gummibears.nu>

next in thread | previous in thread | raw e-mail | index | archive | help

Thus spake Nathan J. Yoder <njyoder@gummibears.nu>:
>         I'd like to suggest that the downloads for FreeBSD systems
> (whether directly through *.FreeBSD.org or not) should be digitally
> signed.  By digital signature I don't simply mean a bare MD5 hash, as
> that could have been changed in transit.  Most importantly, this would
> include cvs files transferred via cvsup (FreeBSD source and ports),
> pre-compiled binary packages and security patches.

That's a good idea, but it's rather hard to implement.  Signing
every CVS revision would not only be computationally expensive,
but it would make it impossible to do the signing ``offline'' in a
secure environment.  That has negative implications for the
security of the security officer's private key.  Signing a CVS
snapshot for every release, on the other hand, is more reasonable.
It wouldn't be seamlessly integrated into CVS, and it would be
inefficient on the client end, but it could at least be automated
(e.g. integrated into 'make update'.)

>              While the FreeBSD security advisories are signed, they
> don't include secure hashes of the patches, rather they just provide
> an insecure FTP link. This leaves it wide open for a MITM attack (in
> the case of FTP this is relatively easy if you can sniff traffic and
> the person uses active mode).

No, a MITM attack isn't possible if you verify the signatures.  If
someone hijacks your FTP connection while you download the patch
and detached PGP signature and sends you a trojan horse instead,
you will find that the signature on the modified patch was not
made by the FreeBSD security officer.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030113165939.GA7457>