LWN: Comments on "Arch Linux and (the lack of) package signing" https://lwn.net/Articles/434990/ This is a special feed containing comments posted to the individual LWN article titled "Arch Linux and (the lack of) package signing". en-us Sat, 01 Nov 2025 09:49:05 +0000 Sat, 01 Nov 2025 09:49:05 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Arch Linux and censorship https://lwn.net/Articles/437638/ https://lwn.net/Articles/437638/ i3839 <div class="FormattedComment"> Years ago I used to help out people on the Arch forum and even made it to moderator. I'm still using Arch, but you won't find me on the forums any more. There are some very immature people with too much power that love to censor anything they don't like personally. After that happened to me and it became clear that I was the only one thinking that censoring is plain wrong I just left. My post that got deleted was quoting the crap some people were posting on the public TU or AUR mailinglist (I forgot the details). I even left out the personal insults, but they were not amused anyway. As I was a mod at the time, I could probably have restored my post, but it's the principle of censoring stuff you don't like which is very wrong.<br> <p> I also wrote a patch adding the ability to upgrade only packages that were x days old (the only sensible way to add some stability to a rolling release package system IMHO), and a bunch of buffer overflow fixes for Pacman, but they didn't make it in either as far as I know.<br> <p> I know others that left the forum/Arch for similar reasons. All very disheartening. Sad that not much changed since I left.<br> <p> </div> Sat, 09 Apr 2011 11:25:42 +0000 Security of a git tree https://lwn.net/Articles/436740/ https://lwn.net/Articles/436740/ jrn <div class="FormattedComment"> Presumably he has, since git refuses to fetch over HTTP without it.<br> <p> Perhaps the servers you've been connecting to use the (relatively) new "smart" HTTP support, which negotiates which objects to send using a CGI script.<br> </div> Sun, 03 Apr 2011 07:37:00 +0000 Security of a git tree https://lwn.net/Articles/436737/ https://lwn.net/Articles/436737/ smurf <div class="FormattedComment"> I don't think you've heard of "git update-server-info".<br> It creates a few index files which speed up the job considerably.<br> (It's typically run from the post-update hook in the shared repository.)<br> </div> Sun, 03 Apr 2011 06:17:39 +0000 Security of a git tree https://lwn.net/Articles/436734/ https://lwn.net/Articles/436734/ vapier <div class="FormattedComment"> i dont think you've ever used git over http. the performance is downright awful for even small repos.<br> </div> Sun, 03 Apr 2011 02:52:38 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/436403/ https://lwn.net/Articles/436403/ Lord_REL <div class="FormattedComment"> signing support has been added in pacman 3.5.0 and relevant packaging scripts<br> </div> Thu, 31 Mar 2011 20:35:22 +0000 Security of a git tree https://lwn.net/Articles/435962/ https://lwn.net/Articles/435962/ smurf <div class="FormattedComment"> You don't need a git server for mirriring a git archive.<br> That works quite well with http.<br> <p> </div> Wed, 30 Mar 2011 02:08:08 +0000 Security of a git tree https://lwn.net/Articles/435897/ https://lwn.net/Articles/435897/ vapier <div class="FormattedComment"> signing a SHA1 doesnt increase confidence in SHA1 in any way. it's still a SHA1.<br> <p> you missed the "resources" aspect. high compression means significantly higher cpu/mem usage which makes scaling up much harder. plus, our mirrors now have to run a git daemon to do mirroring ? it just doesnt work out.<br> <p> as a developer, you can mirror the VCS tree yourself.<br> </div> Tue, 29 Mar 2011 18:34:41 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435702/ https://lwn.net/Articles/435702/ jschrod <div class="FormattedComment"> I read both, and I disagree. The article presents one viewpoint and makes that clear. The blog with the disagreeing opionion is linked. The article facts don't seem to disagree with the Arch developer's blog, only their interpretation. (This guy comes away as very very sensitive, by the way.)<br> <p> For the record: I have never used Arch Linux, don't intend do, and don't know any of the involved persons.<br> <p> I assume that you are as uninvolved in Arch Linux as I am, otherwise you would have surely noted that when calling for censorship of an opinionated article.<br> </div> Mon, 28 Mar 2011 16:26:55 +0000 Security of a git tree https://lwn.net/Articles/435660/ https://lwn.net/Articles/435660/ nye <div class="FormattedComment"> <font class="QuotedText">&gt;SHA1 is broken WRT collisions, i.e. you can find (with a lot of effort) two "random" bytestrings which hash to the same SHA1.</font><br> <p> In principle yes, but nobody's ever actually done it with full SHA1 - until it gets a bit more broken than it currently is, going beyond proof-of-concept attacks on much reduced versions of SHA1 would still require more computing power than is currently feasible.<br> <p> <font class="QuotedText">&gt;But as SHA1 is considered "broken enough" that it should be phased out</font><br> <p> True, it would be a bad choice for something new, but things aren't so terribly bad for SHA-1 yet - hell, there aren't even any pre-image attacks for *MD5* yet AFAIK and that's been considered utterly broken for *years*.<br> </div> Mon, 28 Mar 2011 11:01:20 +0000 Security of a git tree https://lwn.net/Articles/435559/ https://lwn.net/Articles/435559/ smurf <div class="FormattedComment"> SHA1 is broken WRT collisions, i.e. you can find (with a lot of effort) two "random" bytestrings which hash to the same SHA1.<br> <p> That's not the same as finding a bytestring which hashes to a given SHA1, which is still easier than to find a bytestring with, together with a given ASCII pre- and postamble, will match that given SHA1.<br> <p> I don't think there's a feasible attack for the latter. But as SHA1 is considered "broken enough" that it should be phased out, AFAIK current efforts on one-way hashes are more focused on trying to break the several candidates for SHA's replacement, than to break SHA1 'even more'.<br> </div> Sat, 26 Mar 2011 20:39:19 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435507/ https://lwn.net/Articles/435507/ nicooo <div class="FormattedComment"> I agree. Also, there are some books at the local library that are wrong and the sensible thing for the municipality to do is burn them.<br> </div> Fri, 25 Mar 2011 23:44:51 +0000 SHA1 https://lwn.net/Articles/435463/ https://lwn.net/Articles/435463/ alex I was going from memory but <A href="http://www.schneier.com/blog/archives/2005/02/sha1_broken.html">it seems so</a>. Having said that there is a long road from generating collisions to a feasible attack. However from a crypto point of view you are no longer being protected by the maths ;-) Fri, 25 Mar 2011 15:54:49 +0000 Security of a git tree https://lwn.net/Articles/435445/ https://lwn.net/Articles/435445/ foom <div class="FormattedComment"> <font class="QuotedText">&gt; Manufacturing a SHA1 collision is certainly doable.</font><br> <p> Really? Isn't it still only theoretical?<br> </div> Fri, 25 Mar 2011 14:04:02 +0000 Security of a git tree https://lwn.net/Articles/435427/ https://lwn.net/Articles/435427/ alex <div class="FormattedComment"> Manufacturing a SHA1 collision is certainly doable. Doing it in a way that allows you to modify an individual commit in a git tree while also not breaking git's internal consistency with respect to history is an attack I've not seen done yet.<br> <p> And of course you can sign tags with GPG for extra confidence.<br> <p> As far as bandwidth and diskspace is concerned it would be worth doing some tests before ruling it out as less efficient than rsync. The over the air update protocol is fairly efficient and the .git directory is often smaller than the checked out tree as it's fairly heavily compressed. Plus of course as a developer it's really useful to have the whole history of an ebuild available to you when diagnosing issues or trying to understand why something was done.<br> </div> Fri, 25 Mar 2011 10:10:41 +0000 Funtoo https://lwn.net/Articles/435426/ https://lwn.net/Articles/435426/ alex <div class="FormattedComment"> I did look at Funtoo, unfortunately the git repo (or at least the gentoo mirror side) was just a daily snapshot of the CVS tree. That doesn't give you any confidence that the mirror hasn't been compromised.<br> <p> Really you want each change to the metadata to be a discreet verifiable commit.<br> </div> Fri, 25 Mar 2011 10:03:57 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435423/ https://lwn.net/Articles/435423/ BradReed <div class="FormattedComment"> I fully agree with what you said. I know nothing about this first-hand, and have never even tried Arch Linux. I just saw McGee's post on reddit and thought it might be worthwhile to link to it here. It definitely expressed a different view on things.<br> <p> The truth is probably somewhere in the middle.<br> </div> Fri, 25 Mar 2011 09:44:10 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435401/ https://lwn.net/Articles/435401/ nonoitall <div class="FormattedComment"> Kudos to LWN for helping to bring this to light. When I heard you guys had posted this article I just had to subscribe to give a little thanks. :-)<br> </div> Fri, 25 Mar 2011 05:42:20 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435386/ https://lwn.net/Articles/435386/ nicooo It seems like there are some <a href="http://www.gentoo.org/proj/en/glep/glep-0057.html#motivation">issues</a> that still need to be resolved. Fri, 25 Mar 2011 02:53:41 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435385/ https://lwn.net/Articles/435385/ IgnorantGuru <div class="FormattedComment"> Due to your curious message, I just found one of Allan's comments in the spam folder - he used so many links Wordpress nailed it as spam. I will restore it. He never informed me of the missing comment, and this is the first time the spam filter has ever nailed a legit comment. My apologies. I do not edit or delete reader's comments.<br> <p> </div> Fri, 25 Mar 2011 02:46:00 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435382/ https://lwn.net/Articles/435382/ nlucas <div class="FormattedComment"> I don't think the article is in any way offensive or wrong.<br> It may be biased because an author not directly related to the story may catch the wrong viewpoint, but that doesn't make it wrong - only out of context when more information is available later.<br> <p> As it is, even after reading the other side of the story, I don't see anything wrong with it. No impartial person can deny that even if IgnorantGuru may have gone beyond reason, his main point was still valid, and not answered as it should.<br> <p> P.S. I don't have any reason to think badly of ArchLinux (nor had in the past or will start now). I still think it's an interesting distro, even if I never used it and maybe never will. To me this just means there are times where perfectly fine people just have a bad moment.<br> <p> </div> Fri, 25 Mar 2011 02:40:15 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435376/ https://lwn.net/Articles/435376/ randomguy3 <div class="FormattedComment"> Disclaimer: I am a happy Arch user, but have no particular familiarity with the Arch development community.<br> <p> The impression I get from IgnorantGuru's blog post is of someone who has stamped his foot and yelled and not got his way. I agree with him insofar as I believe that package signing should be implemented, and should be given a higher priority than the pacman developers have apparently given it. However, from what I have read (summaries of the situation by IgnorantGuru and Dan, and some of the bug reports), IgnorantGuru appears to be ignorant (ha ha) of how to go about getting something implemented in an open source project.<br> <p> Protip 1: simply telling the developers that something is very important for them to do (and even that it's "easy") will not get them on your side.<br> <p> Protip 2: being antagonistic (which is how IG comes across in <a href="https://bugs.archlinux.org/task/23101">https://bugs.archlinux.org/task/23101</a>, for example) will not get them on your side.<br> <p> In fact, IgnorantGuru's whole approach to this seems to be a textbook example of how not to get a feature you want implemented. He has been antagonistic and demanding, and has failed to get involved in the development process (in the manner generally accepted by the project) while at the same time claiming that implementing signing is easy.<br> <p> In fact, the main sticking point in this whole issue seems to be that there is no-one who cares sufficiently about package signing that is both able and willing to write and maintain the code, and see the feature through to completion, in a way that is acceptable to the maintainers. And, like it or not, that's what it takes to get something done in a relatively small volunteer-run open source project like Archlinux.<br> <p> All this is not to absolve Dan and Allan of any wrongdoing, however. But I am not in the least bit surprised that IgnorantGuru has not acheived his goal, given how he went about it.<br> </div> Fri, 25 Mar 2011 01:50:58 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435359/ https://lwn.net/Articles/435359/ wonder <div class="FormattedComment"> <font class="QuotedText">&gt; Below is my brief reply to Dan McGee. I posted this on his blog but given &gt; the Arch way of doing things, he'll probably just delete it</font><br> <p> Look who's talking. the guy who deliberate block Allan's comments on his blog.<br> <p> Dan would never do that.<br> </div> Fri, 25 Mar 2011 00:19:30 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435356/ https://lwn.net/Articles/435356/ IgnorantGuru <div class="FormattedComment"> This is not the Arch Forums.<br> <p> </div> Thu, 24 Mar 2011 23:52:15 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435352/ https://lwn.net/Articles/435352/ IgnorantGuru <div class="FormattedComment"> Below is my brief reply to Dan McGee. I posted this on his blog but given the Arch way of doing things, he'll probably just delete it. I notice Arch devs are now attacking LWN and trying to get them to delete their story. What's with these guys? This has been their approach to this issue for years - silence it. I still see no indication that their users' security is of any importance to them. Just ego.<br> <p> LWN should be applauded for taking the heat for bringing this issue forward with integrity, and not buying the spent Arch dev arguments that no one has been willing to contribute. That is false - I have also heard privately from many devs who told me they also tried to get things done and hit the same brick wall. And I have been thanked by many Arch users for making them aware of this issue. LWN has their priorities right - they are informing their readers of a serious security problem. Silence and censorship is not the solution. Don't shoot the messenger.<br> <p> As for package signing being 'almost done' - we'll see. They said this in 2008.<br> <p> My reply to Dan McGee:<br> <a rel="nofollow" href="http://igurublog.wordpress.com/2011/03/24/lwn-picks-up-on-package-signing/#comment-1257">http://igurublog.wordpress.com/2011/03/24/lwn-picks-up-on...</a><br> <p> </div> Thu, 24 Mar 2011 23:51:14 +0000 Gentoo Mitigations? https://lwn.net/Articles/435351/ https://lwn.net/Articles/435351/ blitzkrieg3 <div class="FormattedComment"> So what? It doesn't mean the packages are signed.<br> </div> Thu, 24 Mar 2011 23:32:51 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435331/ https://lwn.net/Articles/435331/ giraffedata <p>Dan McGee's explanation doesn't cover the censorship, except to mention in passing that it happened and calling the triggering post a "rant that looked more like a blog post." IgnorantGuru says that he was told the problem was that the post was "trolling." I read it, and I don't think this moderator knows what the word means. IgnorantGuru also says the moderator said he was warned multiple times, but he doesn't remember being warned. <p> McGee makes a good case that IgnorantGuru's criticism was unfair, but I'm still troubled by the silencing of it. <p> McGee's blog post, by the way, shows him to be hypersensitive and highly defensive with respect to the LWN article. The LWN article is unbalanced, but not dishonest. As a neutral reader, I was aware throughout that I was seeing a report of IgnorantGuru's beliefs. The article's wording is careful enough that it is in fact consistent with McGee's version. Thu, 24 Mar 2011 22:09:38 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435327/ https://lwn.net/Articles/435327/ jiu <div class="FormattedComment"> I think after reading both this article and Dan McGhee's response, the sensible thing for LWN would be to delete this article altogether. No point propagating baseless accusations of the arch devs.<br> </div> Thu, 24 Mar 2011 21:54:48 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435316/ https://lwn.net/Articles/435316/ BradReed <div class="FormattedComment"> You may want to hear the opposing side of the story:<br> <p> <a href="http://www.toofishes.net/blog/real-story-behind-arch-linux-package-signing/">http://www.toofishes.net/blog/real-story-behind-arch-linu...</a><br> </div> Thu, 24 Mar 2011 20:28:10 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435308/ https://lwn.net/Articles/435308/ vapier <div class="FormattedComment"> hmm, should be trivial to start enforcing manifest signing in the main tree. it's trivial to setup keys after all.<br> <p> $ find *-* -maxdepth 2 -name Manifest | wc -l<br> 14438<br> $ find *-* -maxdepth 2 -name Manifest -exec grep -l 'BEGIN PGP SIGNATURE' {} + | wc -l<br> 6032<br> <p> that is fairly abysmal ...<br> </div> Thu, 24 Mar 2011 19:48:23 +0000 Gentoo Mitigations? https://lwn.net/Articles/435306/ https://lwn.net/Articles/435306/ vapier <div class="FormattedComment"> except for when the Manifest itself is signed<br> <p> anyone who truly cares about security is not going to rely on SHA1 checksums. claiming "use git" is a fix is ridiculous.<br> <p> plus, you're now syncing the git tree which balloons overhead considerably since the entire history is mirrored and not just the latest set of files. i'm sure the mirrors giving up free space/bandwidth/resources will love that.<br> </div> Thu, 24 Mar 2011 19:47:40 +0000 Gentoo Mitigations? https://lwn.net/Articles/435304/ https://lwn.net/Articles/435304/ quentin.casasnovas <div class="FormattedComment"> You may want to take a look at Funtoo, a "Gentoo Linux variant personally developed by Daniel Robbins, creator of Gentoo Linux" : it uses git instead of rsync to update the portage tree.<br> </div> Thu, 24 Mar 2011 19:35:33 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435227/ https://lwn.net/Articles/435227/ hickinbottoms <div class="FormattedComment"> <font class="QuotedText">&gt; You are many years out of date :) </font><br> <p> I suspected as much! However, I looked into this feature today and it doesn't appear to be enabled in the currently marked-stable portage (on my system, at least):<br> <p> <font class="QuotedText">&gt; # emerge ...whatever...</font><br> <font class="QuotedText">&gt; FEATURES variable contains unknown value(s): gpg</font><br> <font class="QuotedText">&gt; Portage 2.1.9.42 (default/linux/x86/10.0, gcc-4.4.5, glibc-2.11.3-r0, 2.6.35-gentoo-r12 i686)</font><br> <p> Still, as you say it counts for little if most of the software isn't signed by the mai<br> </div> Thu, 24 Mar 2011 16:46:35 +0000 Gentoo package signing https://lwn.net/Articles/435225/ https://lwn.net/Articles/435225/ alex <div class="FormattedComment"> So I assume if old packages aren't signed portage will either allow them or refuse to install them depending on the level of the feature?<br> <p> /me makes a note to enable the gpg feature.<br> </div> Thu, 24 Mar 2011 16:39:02 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435201/ https://lwn.net/Articles/435201/ tetromino <div class="FormattedComment"> <font class="QuotedText">&gt; Unless I'm out of date I believe Gentoo has also always suffered this, and continues to do so. </font><br> <p> You are many years out of date :) Gentoo's portage has had the ability to use GPG to sign and verity package manifests since 2004: <a href="http://www.gentoo.org/news/20041021-portage51.xml">http://www.gentoo.org/news/20041021-portage51.xml</a><br> <p> What is true is that there seems to be no policy requiring Gentoo developers to sign manifests, and as a result, many developers never bother to do so and thousands of packages remain unsigned.<br> </div> Thu, 24 Mar 2011 15:50:50 +0000 Gentoo Mitigations? https://lwn.net/Articles/435180/ https://lwn.net/Articles/435180/ hickinbottoms <div class="FormattedComment"> Indeed, but of course there's no private key signature element to the manifest, and the manifest is held on the same mirror as the ebuild ('recipe'), which includes the location to download the source from.<br> <p> This makes it a trivial matter to replace packages without end-user detection if you have write access to a mirror (and there are lots of mirrors). This is the same problem reported in the original article on Arch.<br> <p> I'm sure you knew this but wanted to point it out since I don't think the presence of the manifest does anything other than to aid detection of corruption of the source tarball during or after download - it doesn't help with indicating package authenticity at all.<br> <p> I believe there have been discussions over a git-based Portage but it's not got anywhere significant as yet, and GPG-based package signing seems to have been discussed for many years but still isn't stable as far as I can tell.<br> </div> Thu, 24 Mar 2011 13:36:00 +0000 Gentoo Mitigations? https://lwn.net/Articles/435173/ https://lwn.net/Articles/435173/ alex <div class="FormattedComment"> Gentoo has manifest checksums which need to be updated when the recipe is. This is vulnerable to compromise and of course assumes the developer has checked their copy of the upstream tarball hasn't been comprised.<br> <p> One mitigation would be move from rsync'ing the portage tree (which I believe is still held in CVS) to using a git tree instead. At least this way you can be sure* the metadata hasn't been tampered with between syncs. Of course you still depend on the developer doing due diligence on the first tree.<br> <p> I'm not sure if the nature of the distribution (being source based) widens or narrows the attack surface.<br> <p> * YMMV, I don't believe anyone has managed an attack on a git repo yet.<br> </div> Thu, 24 Mar 2011 12:28:04 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435147/ https://lwn.net/Articles/435147/ hickinbottoms Unless I'm out of date I believe Gentoo has also always suffered this, and continues to do so. Thu, 24 Mar 2011 08:28:41 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435143/ https://lwn.net/Articles/435143/ bo <div class="FormattedComment"> ...and here is the commit log for pacman's master branch grepped for "signature": <a href="http://projects.archlinux.org/pacman.git/log/?showmsg=1&amp;qt=grep&amp;q=signature">http://projects.archlinux.org/pacman.git/log/?showmsg=1&amp;...</a><br> <p> Note that Allan is the author of a number of these patches.<br> </div> Thu, 24 Mar 2011 07:38:03 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435137/ https://lwn.net/Articles/435137/ wonder <div class="FormattedComment"> FYI package signing was merged in master couples of days ago. <br> </div> Thu, 24 Mar 2011 06:44:51 +0000 Arch Linux and (the lack of) package signing https://lwn.net/Articles/435130/ https://lwn.net/Articles/435130/ joey <div class="FormattedComment"> <font class="QuotedText">&gt; Almost all prominent Linux distributions use package signing to allow </font><br> <font class="QuotedText">&gt; users and system administrators to verify the integrity of packages. </font><br> <font class="QuotedText">&gt; Typically, package uploaders use a private GPG key to sign the package </font><br> <font class="QuotedText">&gt; before it is pushed to the release server</font><br> <p> That approach is not entirely typical -- Debian and presumably most or all of its derivatives use the second approach, where there's a checksum-based trust path to a central file that is signed.<br> <p> This broadly reminds me of discussions in Debian about how to provide a trust path to packages. Some wanted to embed the signatures inside each package, while others preferred that a central list of packages in the distribution (and checksums) be signed, and some preferred both. There were plusses and minuses to both approaches (for example, if packages are individually signed by their uploaders, how to handle key revocation? if packages are centrally signed, how to handle the checksum path becoming cryptographically broken?), and implementing both methods and deciding between them took time in which there remained little strong security.<br> <p> Of course, that was many years ago, and I can't remember anyone doing quite the ostrich imitation described in this article.<br> </div> Thu, 24 Mar 2011 06:10:16 +0000