touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #11144
[Bug 1330770] Re: click packages rely upon tls for integrity and authenticity
This bug was fixed in the package unity-scope-click -
0.1.1+14.10.20140821.1-0ubuntu1
---------------
unity-scope-click (0.1.1+14.10.20140821.1-0ubuntu1) utopic; urgency=medium
[ Alejandro J. Cura (alecu) ]
* New upstream release.
- Display Ubuntu logo in the header of apps scope. (LP: #1350610)
- Pass the sha512 hash from the details webservice to download manager.
(LP: #1330770)
- Sort departments alphabetically. (LP: #1354044)
- Exclude empty departments from the departments tree in Apps.
(LP: #1350609)
- Provide updated departments to match latest server changes. Bumped
schema to 3.
- New script to enable purchases in the scope during beta. (LP: #1356419)
- Add dependency on libglib2.0-bin and upstart-bin for script above.
- Enable QNetworkDiskCache for http GET requests. (LP: #1351212)
- Query download manager for in-progress downloads. (LP: #1234965)
- Only show extended info for apps from the store. (LP: #1350571)
- Don't expand categories by default in the store. (LP: #1355221)
- Do not use static const strings for translations. (LP: #1354501)
- Change "All departments" to just "All". (LP: #1351536)
- Localize the extra department title in the store. (LP: #1358790)
- Updated translations.
[ Martin Pitt ]
* Mark for using language packs.
[ Ubuntu daily release ]
* New rebuild forced
-- Ubuntu daily release <ps-jenkins@xxxxxxxxxxxxxxxxxxx> Thu, 21 Aug 2014 20:40:59 +0000
** Changed in: unity-scope-click (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click in Ubuntu.
https://bugs.launchpad.net/bugs/1330770
Title:
click packages rely upon tls for integrity and authenticity
Status in Click Package metadata search service:
Fix Released
Status in Online service used by software center:
Fix Released
Status in Click Packages Scope for Unity:
Fix Committed
Status in “click” package in Ubuntu:
In Progress
Status in “ubuntu-system-settings” package in Ubuntu:
Triaged
Status in “unity-scope-click” package in Ubuntu:
Fix Released
Bug description:
Hello, I just completed a quick review of the click source and the
unity-scope-click source and behaviours, and found some opportunities
for improvement.
Debian, and Ubuntu, rely upon signed repository files with
cryptographic hashes of packages to provide both integrity and
authenticity checks for the packages hosted on that repository.
The click framework and the unity-scope-click discovery and
installation tool do not use signed repository files, nor do they have
signatures of any sort on downloaded packages. The only integrity and
authenticity checks are provided by the use of HTTPS. The click
verify command will check files within the archive against MD5sums
stored inside the archive but the click verify command is not used
during package installation. (This is suitable for validating
integrity against accidental changes only.)
While it appears that unity-scope-click properly uses HTTPS to
download package metadata and packages, HTTPS alone is insufficient
for our needs:
- Someone in a position to create new certificates at any of several
hundred certificate authorities could create certificates purporting
to be our update servers. This actual problem has been discovered in
the wild with several certificate authorities issuing wild-card
certificates or even certificates with signing authority.
- X.509 is extremely complicated; TLS is extremely complicated. Flaws
in both are inevitable.
- HTTPS prevents the use of caching.
- HTTPS only 'works' for data-in-motion; it is useless for data-at-
rest integrity and authenticity checks.
I have not yet reviewed the tools that application authors will use to
upload their packages to our distribution servers but note in passing
that most of these issues are also issues for adding packages to our
update servers -- packages in flight within our network can be
corrupted for many reasons, packages on disk can be corrupted for many
reasons. A signature mechanism can protect against internal network
faults, storage faults, and provide assurance months or years later
that an uploaded package was uploaded by someone in control of a
corresponding private key.
Thanks
To manage notifications about this bug go to:
https://bugs.launchpad.net/click-package-index/+bug/1330770/+subscriptions