On 08/27/12 21:38, adrelanos wrote:
> Joanna Rutkowska:
>> > What is a problem (and the reason we still don't have SSL on
>> >
qubes-os.org) is that I _really_ don't like an idea of putting a private
>> > SSL key on the _untrusted_ web server. So far, we have managed to avoid
>> > the need to trust our servers thanks to use of digital signatures, on
>> > git, rpm packages, and ISOs.
> I think that's how most websites do it. Unless they can afford own
> buildings and security officers.
>
>> > Now, I'm afraid that once we moved on toward an wholly-SSLed site, then
>> > nobody will bother anymore to e.g. verify ISO signatures, or to try to
>> > verify our signing keys in any other way (e.g. googling fingerprints on
>> > mailing lists, etc). And this is not good, because, again, we don't own
>> > our servers, and generally don't trust them for a number of reasons.
> Ironically, you will have much more healthy users, if you have SSL
> everywhere. It does not protect against malicious server but it's useful
> in hotspots, behind proxy servers, etc.
>
The point is that one doesn't download an ISO with a new OS to install
every day, and when one does it, I think it's not unreasonable to expect
that this person will invest some 15 minutes of Internet research to
validate signature and the fingerprints... Again, ISO download is the
only thing that requires this. Updates are automatically verified
already, and SSL cert is not needed for this.
> Only a minority of people cares to verify fingerprints manually. How
> many depends on your target audience.
>
>> > So, I'm still thinking whether it's such a good idea to really have it,
>> > whether to have it for the whole *.
qubes-os.org, or just the
>> >
keys.qubes-os.org (and, so, still require to somehow manually and
>> > consciously verify the ISOs) and the wiki (which is not security sensitive).
> Also the wiki is security sensitive. Someone could spoof "download this
> version rather than ..." or malicious instructions.
Well, for this kind of "attack" there is really no workaround. We could
buy the most expensive EV certs for
qubes-os.org, spend a good deal of
time hardening all our services, such as wiki, etc, and still somebody
might register
qubes.org or
qube-os.org that would look similar and
distribute some malware from there. (Actually
qubes.org is already
registered by someone, as is the
qube-os.org ;)
So, no, wiki is not security sensitive, as none of our servers is. When
one day somebody vandalizes our wiki server (or git, or web) we would
only be angry that we might have lost up to a few days of unbackuped
tickets/wiki edits.
I said vandalized, because other types of compromises of our wiki or web
servers would be... rather irrelevant for us, as there is really no
sensitive data to steal from those public servers. The only problem
might be the CPU time/network bandwith rip off (e.g. if they used our
servers as part of a botnet), but I have hope in networking skills of
the AWS security team to block such incidents on time (or, at least, to
not charge ITL for such bandwidth use!)
I guess the message I'm trying to convey now is: server security is so
90's! ;) As usual, there are exceptions to this rule, but not for an
open source project like Qubes OS.
joanna.