public inbox for elfutils@sourceware.org
 help / color / mirror / Atom feed
From: "Frank Ch. Eigler" <fche@redhat.com>
To: Mark Wielaard <mark@klomp.org>
Cc: elfutils-devel@sourceware.org
Subject: Re: [PATCH] PR28204, debuginfod IMA
Date: Tue, 14 Nov 2023 11:45:48 -0500	[thread overview]
Message-ID: <20231114164548.GG32463@redhat.com> (raw)
In-Reply-To: <e0a0c75cee0c9b6e85b51229c9ca7d2b67573de1.camel@klomp.org>

Hi -

> >    \fIima:optimistic\fP Every downloaded file with a known-invalid
> >    signature is rejected, protecting against some types of corruption.
> 
> I like this wording more. But maybe it would be helpful to split the
> patch into one that implements ima:enforcing and another that adds the
> ima:optimistic idea. That way we can more easily get the code in that
> we seem to agree on. And it makes it more clear what extra code is
> needed for the other policies.

I interpret this as a veto for the "optimistic" mode.  Too bad, this
is going to reduce usability and utility.  What mode do you want by
default then, "ignore" or "enforcing"?


> > We sign our elfutils releases, and packagers often sign their builds
> > of our releases, which users can verify.
> 
> Right, but those are files we write and distribute. These are
> certificates that other use to sign files they distribute.

They use unpublished private keys to sign files.  Public certificates
allow anyone to verify the signatures.


> > > So you propose we setup a curating process to decide which certificates
> > > to include? 
> > 
> > Sure.  We already curate a set of debuginfod servers.

> You mean the list of servers that https://debuginfod.elfutils.org/
> federates? I don't mind that server also maintaining a list of ima
> certs for those servers. 

I assume you mean to require users to manually download & install them
somehow.


> But make sure the distros actually want someone else to redistribute
> their certificates.  I can imagine distros wanting people to get
> their certificates from them directly.

Certificates are public keys.  They are literally designed for wide
distribution.  They may be authenticated further by certificate
chains, but there is little harm to even crafted certificates.  They
would not be usable to verify signatures, leaving the user no worse
off than without the certs.


> I don't think we should redistribute them as part of the main elfutils
> package though.

I interpret that as a veto.


> > Ugh.  I don't know of an alternative.  There isn't an equivalent
> > command line wrapping of the library either (with respect to
> > certificate searching) that we could fork out to.  (OTOH, GPLv2 is
> > compatible with GPLv2+.)
> 
> But GPLv2-only is not compatible with GPLv3 which is used by e.g. gdb.
> This is a bit of a pickle :{

I interpret that as a veto.  OK, will have to set time aside to
rewrite this code.


- FChE


  reply	other threads:[~2023-11-14 16:45 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-09-07 12:55 Frank Ch. Eigler
2023-10-23 19:33 ` Mark Wielaard
2023-10-24 13:27   ` Frank Ch. Eigler
2023-10-24 21:03     ` Mark Wielaard
2023-10-27 19:15       ` Frank Ch. Eigler
2023-10-31 13:20         ` Mark Wielaard
2023-10-31 15:46           ` Frank Ch. Eigler
2023-11-01 14:59             ` Mark Wielaard
2023-11-14 16:45               ` Frank Ch. Eigler [this message]
2023-11-15 16:00                 ` Mark Wielaard
2023-10-24 15:25 ` Mark Wielaard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20231114164548.GG32463@redhat.com \
    --to=fche@redhat.com \
    --cc=elfutils-devel@sourceware.org \
    --cc=mark@klomp.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).