[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug#752450: ftp.debian.org: please consider to strongly tighten the validity period of Release files



On Mon, 2014-09-15 at 00:04 +0200, Stefan Lippers-Hollmann wrote: 
> Please consider that too short intervals (24h might still work, but 
> it's hard on the limit) make non-primary (cron based) mirrors basically
> impossible. Including local mirrors used for systems that can't connect
> to the internet directly or potentially even setups used for (personal)
> archive-wide rebuilds or debian-cd related tasks. Intervals below an
> hour, besides probably even invalidating most primary mirrors, are 
> likely to render apt-get update to expire before it has finished
> downloading the meta data for all repos on slower internet connections.
Well as I've said in my post before: such slow systems should just need
to resync the (re-signed) metadata files at a more current point.

But of course you're right, extremely slow mirrors and/or pull models
are likely to cause troubles (or break), but their working model is
simply broken, at least with respect to security.


> Decreasing these validity cycles too much would force many of these 
> uses to ignore expiry times alltogether - or having to re-sign a local 
> archive mirror with longer periods (which is not exactly a reasonable 
> task for most users or anything that involves debootstrapping). I guess
> most uses would opt to go with the first option instead, which won't 
> help anyone...
Well, users can always take a gun and shoot themselves. No reason to
expose *all* users to security issues, if there is (small?) fraction of
users who would just completely deactivate secure APT, if it means too
much effort for them.

I mean that's basically always the problem with security, isn't it? You
don't get it for free, which is why we have crap like the Internet's
X.509 certificate hierarchy that basically fails and breaks and all
points. If a really strong (i.e. meshed) system would have been used,
many end-users would have refused to use it altogether, wich is why we
have a system now, that is basically useless for all.


> Personally I think 24 hours (better something like 26-28 hours to allow
> some overlap for secondary/ tertiary/ local mirrors only updated daily)
> would be the technical limit that might be possible, but anything 
> shorter than a week (or at very least three days) would already 
> significantly impact many valid use cases where local mirroring and/or 
> a fixed archive state is required.
Don't you think it would be possible for mirrors, to have faster resync
of just the meta-datafiles? I mean these are really small, and actually
it should be only necessary to frequently resync the [In]Release* files,
if everything else stayed the same, only they will have changed for the
new validity times.


> While there might be an argument to decrease the expiry times for 
> security.d.o, perhaps even down to a day or at least half a day[1], the
> negative net impact for all normal archives (especially testing and
> unstable) would imho far outweigh any potential security improvements.
Why?
I guess many people use e.g. sid as their main system, so all of them
will get their security upgrades via that and not via security.d.o.
So they would be still left vulnerable downgrade attacks in case of such
things like the bash/apt holes from these days, even though Debian might
have perfectly reacted and already supplies fixed packages.


> Just look at the common advice given for expired signatures on 
> snapshots.d.o, most suggest to use a global 
> 
> 	apt-get -o Acquire::Check-Valid-Until=false update
> or
> 	Acquire::Check-Valid-Until "0";
> 
> for apt.
Well sure, but snapshots.d.o is a completely different story, isn't it?
Everyone using it, should be aware that these are old archived packages,
and that it's not so unlikely that they contain security issues.
In other words, there is no implicit guarantee in any way that
snapshot.d.o gives you secure stuff - therefore we don't need to defend
against things like blocking/downgrade attacks.


> For these reasons I would suggest against changing the current 
> intervals, especially least not into the hour- or single day regions.
Well I think the current intervals (what were they? 1 month?) are *far*
too long.
If there should be really insolvable technical issues (and I guess most
of them might be solved by quickly resyncing the [In]Release* files,
which should be trivial)... than one day is probably the interval I'd go
for.



Cheers,
Chris. 
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature


Reply to: