incubator-general mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From sebb <seb...@gmail.com>
Subject Re: Incubator Maven repo [WAS Re: [VOTE] [POLICY] Allow extra release distribution channels like the central Maven repository]
Date Thu, 18 Sep 2008 20:57:09 GMT
On 18/09/2008, Hiram Chirino <hiram@hiramchirino.com> wrote:
> On Thu, Sep 18, 2008 at 2:26 PM, William A. Rowe, Jr.
>
> <wrowe@rowe-clan.net> wrote:
>
> > Hiram Chirino wrote:
>  >>
>  >> So the responsibility is still on us, the upstream distributor, to
>  >> verify the the checksums we list in our source distro are correct.
>  >> But at least by doing this, down stream users of our source distros
>  >> can rest assured that the dependencies that they are using are the
>  >> correct ones.
>  >
>  > Not if there is a man in the middle attack.  If you didn't notice the
>  > recent noise w.r.t. DNS pollution, that's the very point of that vector.
>  > Had it been exploited, tens of thousands of download users could have
>  > been presented with inauthentic maven artifacts, complete with their
>  > freshly corresponding checksums.  Welcome to the internet.
>
>
> Yes, but that kind of attack would only affect me if It's the first
>  time I'm creating a dependency to that artifact.

Which will be the case for everyone intially.

Suppose you want to create a checksum list for Apache Foo.
This uses say 30 Maven artefacts.
You check each one against the official release version to validate
the checksum list.

Someone else creates list for Apache Wee.
They have to go through the same process of validation.

Someone else creates another list for Apache Foo.
They have to go through the same process of validation.

There's no easy way to share the result of a validation, except
perhaps with a TLP.

Whereas once a Maven artefact is signed, everyone who trusts the
signature knows it is OK. Seems to me a lot less work overall.

>  Further more, other
>  existing users of the artifact would detect the artifact replacement,
>  and act to get the problem corrected.

If you don't notice the problem, why would they notice?

> I consider the checksum
>  solution very similar to how SSH work in asking you to verify your
>  initial connection to a host.  It's not 100% secure, but in practical
>  use, it's in the high 90s.  :)
>

Or the low 10s - who knows?

>

How does the process cope with a dependency on commons-foo, version
1.2 or later?

AIUI, Maven can pick a later version of a dependency, which may not
have been available when the checksum list was created.

The advantage of signatures is that if you trust the signer, you can
trust the signed artefact.
That's not true for checksums, which require additional validation.

>  --
>
> Regards,
>  Hiram
>
>  Blog: http://hiramchirino.com
>
>  Open Source SOA
>  http://open.iona.com
>
>  ---------------------------------------------------------------------
>
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
>  For additional commands, e-mail: general-help@incubator.apache.org
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org


Mime
View raw message