[Bug 1834731] Review Request: bitcoin-core - Peer to Peer Cryptographic Currency

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1834731



--- Comment #131 from Björn Persson <bjorn@xxxxxxxxxxxxxxxxxxxx> ---
(In reply to Simone Caronni from comment #128)
> Keys might have been revoked and expired and still being left on the key
> servers. We pick all those up, regardless of their expired/revoked status
> and use them to validate the signed release.

When somebody revokes their key they send the message "I have lost control of
my secret key. Malicious actors may have acquired it, and may be signing things
with it. Do not trust this key anymore!"

Heed that warning! When you see a signature made with a revoked key you should
assume that an attacker made that signature.

> They were valid at the moment of the signature

An attacker can easily change their clock while making a signature to make it
look like the signature was made before the key was revoked.

(In reply to Simone Caronni from comment #129)
> And we don't want that list to be empty because of mass revocations or
> expirations.

If many of the developers revoke their keys, then that's because there has been
a huge security breach. By ignoring such an event you'll probably end up
distributing malware to Fedora users. If there is a purported new release, but
all of the signatures are made with revoked keys, then that release is
malicious and you should not package it.

> Expired/revoked keys will of course not be used in 0.23 to sign, so they
> will not be in that file when we call the script again for the new release.

That's true only as long as nobody attempts a supply-chain attack. If you could
know that there is no attacker, then there would be no need to verify any
signatures at all. For security you must always assume that somebody is trying
to attack you any way they can.

(In reply to Simone Caronni from comment #130)
> If you think this does not answer your concern please provide a patch/diff
> to the script so I can understand what you mean. Thanks.

I don't have tested code ready right now but I think you can use gpg2 instead
of gpgv2 – only in bitcoin-gpg.sh, not in the spec – and (using --status-fd)
grep for "^\[GNUPG:\] GOODSIG " only, excluding REVKEYSIG, EXPKEYSIG, BADSIG et
cetera. That pattern matches only at the beginning of a line to ensure that it
matches a keyword and not some other part of the output. The pattern includes a
trailing space to ensure that it matches a whole keyword, not just a prefix.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
https://bugzilla.redhat.com/show_bug.cgi?id=1834731
_______________________________________________
package-review mailing list -- package-review@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-review-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-review@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite Conditions]     [KDE Users]

  Powered by Linux