From: Walter Harms <wharms@bfs.de>
To: Alejandro Colomar <alx@kernel.org>,
"linux-man@vger.kernel.org" <linux-man@vger.kernel.org>
Subject: AW: Release tarballs and security (xz fallout)
Date: Wed, 10 Apr 2024 19:26:06 +0000 [thread overview]
Message-ID: <2e29520d16d94e0ebd0f1b158e7b7715@bfs.de> (raw)
In-Reply-To: <ZhVe08clpdlkrwpI@debian>
hello, here my opinion ...
I followed the xz hack and the main problem (in my view) is that the person
(tried or go) write access to the git archive. In that case it is game over.
Normaly i run a tar vtzf BEFORE i install a tarball (more to make sure that
they will produce a directory and do not spill everything in my home). That is
be no means perfect but it helps a bit.
For the man-page project i can imagine a 2 tarball solution. One for the pages, and one
for anything executeable, so i can use an older/trusted version of an installer, but
again an "evil maintainer"-attack is - as any suply-chain-attack - hard to notice
and even harder to prevent.
YM2C
wh
________________________________________
Von: Alejandro Colomar <alx@kernel.org>
Gesendet: Dienstag, 9. April 2024 17:29:16
An: linux-man@vger.kernel.org
Betreff: Release tarballs and security (xz fallout)
Hi all!
For context: <https://tukaani.org/xz-backdoor/>
Given the recent XZ vulnerability caught just in time, I wonder if we
should take any action in this project to help the ecosystem.
Some have mentioned that release tarballs are too opaque, and can easily
hide code that's not under git(1) control. I myself have been feeling
like that for a long time.
I've modified the build system recently so that tarballs should be
reproducible byte-per-byte. This means that downstream distributors
don't really need to "trust" tarballs signed by me, but they can (and
IMO should) generate them themselves by running `make dist`, and they
should be fine. Our git tags (and all the commits, BTW) are signed.
Here's my proposal:
Stop distributing release tarballs, and instead ask downstream packagers
to create them themselves by running `make dist`, or even not using
tarballs at all; `make install` from a tarball should be exactly the
same as `make install` from the source repository (IIRC).
Any opinions?
Cheers,
Alex
--
<https://www.alejandro-colomar.es/>
next prev parent reply other threads:[~2024-04-10 19:32 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-09 15:29 Release tarballs and security (xz fallout) Alejandro Colomar
2024-04-10 19:26 ` Walter Harms [this message]
2024-04-10 20:02 ` AW: " Alejandro Colomar
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2e29520d16d94e0ebd0f1b158e7b7715@bfs.de \
--to=wharms@bfs.de \
--cc=alx@kernel.org \
--cc=linux-man@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox