Re: Preventing supply chain attacks via rekor

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Huzaifa Sidhpurwala wrote:
> I am sure everyone has heard about the recent Solarwinds software supply 
> chain attacks. This attack has made all software vendors think about 
> securing their supply chain,  and it is even more applicable to linux 
> distributions which are made of thousands of components built from 
> sources they dont even have control over.

Yes, there is much that could be improved in this area.

> One possible step in this direction is the ability to ensure that there 
> is no distribution point tampering of binaries shipped in Fedora.

What would "distribution point" mean here? Repository mirrors? The
master repository? mirrors.fedoraproject.org?

> this could be a post-build thing, in which ones the rpms reach 
> stable and are signed, rekor would run on it and store the binary 
> metadata in the transparency logs.

As it is now, mirrors can't modify RPM packages without a key that the
clients have installed. Mirrors could however withhold security updates
so that clients remain vulnerable. Is that a thing that Rekor could
prevent?

I believe Yum has a feature to verify signed repository metadata. I
don't know why it's not used. If that verification would be turned on,
are there any attacks that would still be possible then, that Rekor
could prevent?

> More information at:
> 
> https://sigstore.dev/what_is_sigstore/

On that page I can't see anything but a page header and a pointless
animation. Even the text that is right there in the HTML code is hidden.
Instead it wants me to execute a bunch of Javascript from at least three
different domains. When a website expects me to execute some unknown
program before they'll even tell me who they are or what they do, then
I'm much more likely to just ignore that website.

Björn Persson

Attachment: pgp6dmgdUyExX.pgp
Description: OpenPGP digital signatur

_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux