kernel.org no longer centrally signs submissions
kernel.org no longer centrally signs submissions
Posted Nov 8, 2011 19:52 UTC (Tue) by giraffedata (guest, #1954)In reply to: KS2011: Kernel.org report by wookey
Parent article: KS2011: Kernel.org report
Then am I right that the new system wherein developers sign files with their own keys is less valuable than the old one where they were signed by kernel.org automatically? I'm skeptical, but where am I wrong?
With the new system, when I look at a file I know it came from some identifiable individual I don't know anything about. With the old one, I know it came from kernel.org. I know something about kernel.org. I know it's set up (and always has been) to tend not to accept garbage.
Posted Nov 8, 2011 20:56 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (5 responses)
If I understand correctly you don't have any reason to trust the old style kernel.org signature as it doesn't say anything about where the code came from or whether it is garbage or not since everything was automatically signed. All it told you is that the person who uploaded it had legitimate or illicit access to the kernel.org server, nothing more.
You could just assume trust for anything signed, which would be the same security posture as before. It'd be great if there were more easily accessible, clear and accurate documentation on how to do useful signature verification. I just checked the kernel.org signature page and it looked like it hasn't been updated in a decade.
Posted Nov 8, 2011 21:56 UTC (Tue)
by giraffedata (guest, #1954)
[Link] (4 responses)
It told me significantly more, because I know between those two possibilities, the legitimate access one is far more likely than the illicit access one. (If I didn't believe that, I never would have run anything I got directly from kernel.org on my computer).
Posted Nov 8, 2011 23:41 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (3 responses)
Posted Nov 9, 2011 0:24 UTC (Wed)
by jimparis (guest, #38647)
[Link] (2 responses)
Posted Nov 9, 2011 2:49 UTC (Wed)
by giraffedata (guest, #1954)
[Link]
Thanks; that's exactly what I was thinking. The great advantage of a digital signature is that it gives you a basis for trusting something regardless of how it got to you. If I found a kernel by the side of the road, I'd say, "Hell yes, I'll put that on my server. I can see that kernel.org blessed this particular arrangement of bits at some point." But it would be ridiculous to say, "This looks OK. Somebody signed it."
The developer signature appears to serve an entirely different purpose from the kernel.org automatic signature (I suppose it is what tells kernel.org, which does know all the individuals, it's OK to take the code), but the article makes it sound like it is a replacement of -- and improvement on -- it.
Posted Nov 9, 2011 3:11 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
Auto signing doesn't provide any more verification than an md5sum file which would probably be a better choice. When signatures are used people often assume a higher level of verification than really exists. Usually when releases are signed the private key is not publicly accessible and is on a separate device that only release approvers have access to, an offline workstation or smart card for example. That procedure can be a higher level of assurance that the bits you have are the right ones
kernel.org no longer centrally signs submissions
With the new system, when I look at a file I know it came from some identifiable individual I don't know anything about. With the old one, I know it came from kernel.org. I know something about kernel.org. I know it's set up (and always has been) to tend not to accept garbage.
kernel.org no longer centrally signs submissions
All it told you is that the person who uploaded it had legitimate or illicit access to the kernel.org server, nothing more.
kernel.org no longer centrally signs submissions
kernel.org no longer centrally signs submissions
kernel.org no longer centrally signs submissions
kernel.org no longer centrally signs submissions
