[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Proposal to augment CD/faq/#verify, version 2



Hi,

i wrote:
> > - The text points to the authenticity verification page
> >     https://www.debian.org/CD/verify
> >   which gives no tangible example how to verify *SUMS files by *SUMS.sign.

Max Nikulin wrote:
> I do not mind that there is a page which purpose is solely to specify key
> IDs and fingerprints since it is most sensitive info. What I do not like
> are descriptions of links to this page:
> - "verification guide"
>  <https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/
> - "Detailed information on how to authenticate the signed checksum [...]
>   <https://www.debian.org/CD/faq/#verify

That's why i propose to show a full example with  gpg  in the FAQ rather
than pointing to the key-and-fingerprint page, which stays neutral towards
the tools to use.
If gpg is really out of reach, then at least the reader of the FAQ has
something tangible to search in the web for an equivalent procedure with
the tool of choice.


i wrote:
> > $ gpg --keyserver keyring.debian.org --recv-keys 64E6EA7D 6294BE9B 09EA8AC3

> Despite I do not expect keys having collisions for 32 bit identifiers
> uploaded to keyring.debian.org, I think, it is better to use 64 bit
> identifiers here

I understand from the web that in case of identical short key ids all
matching keys are received from the server.
This is not an additional security problem in the proposed instructions
because they prescribe to compare the fingerprint, not the subset of the
fingerprint which is the key id.


> I am unsure if there are drawback of the following recipe. Debian users may
> try:
> sudo apt install debian-keyring

Wouldn't that import all keys ?
If so, then if the short ids impose any problem, downloading all keys
would be even more of a problem.


> Nowadays SUMS files may be obtained using https: protocol from
> cdimage.debian.org even if image file is downloaded from a local mirror. It
> is secure enough.

It is not. Most obviously because if you do not trust the download of
the ISO image, then you cannot trust the SUMS files from the same
directory and via the same internet connection.
On the other hand, if you would trust download directory and connection,
then MD5 would be fully sufficient to detect non-malicious transport
damage. But Debian decomissioned MD5SUMS for a reason.


Have a nice day :)

Thomas


Reply to: