Active Topics

 


Poll: What is your opinion about the migration to Moblin/RPM
Poll Options
What is your opinion about the migration to Moblin/RPM

Reply
Thread Tools
javispedro's Avatar
Posts: 2,355 | Thanked: 5,249 times | Joined on Jan 2009 @ Barcelona
#231
Though this thread needs to be renamed to "Non-debian based MeeGo = NoGo!", since:
- It all started when the move to Fedora/RPM was announced (cue ranting),
- After much discussion the fact that RPM is feature par with DEB started to settle down,
- So then came more ranting about Fedora not doing as much ARM work as Debian [dubious statement][discuss].
- Then someone correctly pointed that MeeGo was not actually based on Fedora,
- And as such the thread became about how bad it was that MeeGo was not being based in any existing distro (like Debian) [sigh].

By now, who knows what the thread is about, other than complaining that MeeGo is not based on Debian . Maybe a link to the Debian Mobile distro in the works would work?
 

The Following 3 Users Say Thank You to javispedro For This Useful Post:
smoku's Avatar
Posts: 1,716 | Thanked: 3,007 times | Joined on Dec 2009 @ Warsaw, Poland
#232
Here you are: https://garage.maemo.org/projects/moebian/
__________________
smoku @xiaoka.com (SMTP/XMPP) ...:.:....:... pebbled . Poky Fish : sixaxis . psx4m . uae4all
Jolla Phone post-mortem . . . . . . . . . . -> 1+1 VGN-UX390N
 

The Following 2 Users Say Thank You to smoku For This Useful Post:
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#233
Originally Posted by smoku View Post
Here you are: https://garage.maemo.org/projects/moebian/
There is link how to repartition,
https://garage.maemo.org/plugins/wik...id=1382&type=g

There in the instructions, one loads deb packets and installs them, without checking authenticity in any way.
I suggest to put corresponded GPG signed *.dsc files available also, so people can manually check and make sure there is no MITM-, nameserver-, or other attack or something.

That is one thing I have always disliked Debian systems, especially their deb-format. They do say authenticity and integrity is handled and no problems there, but developers still install deb packages blindly and cumulative security degradation can go through whole Linux community eventually. (see Thompson's trojan compiler)

At least that will be fixed with RPM-format in Meego as talked before.
http://fedoranews.org/tchung/gpg/
(later, when everything is set up, developer just builds automatically signed packages from spec-file or tarball or src.rpm-file.)
$ rpmbuild -ba --sign newpackage.spec

Last edited by zimon; 2010-03-21 at 17:20. Reason: instructions link how to sign rpm packages (from basics) added.
 
Posts: 3,319 | Thanked: 5,610 times | Joined on Aug 2008 @ Finland
#234
Originally Posted by zimon View Post
That is one thing I have always disliked Debian systems, especially their deb-format. They do say authenticity and integrity is handled and no problems there, but developers still install deb packages blindly and cumulative security degradation can go through whole Linux community eventually. (see Thompson's trojan compiler)
I still understand what *package format* related security problem you're referring to. RPM and DEB are equal in that regard. If you choose not to sign your packages, or the user chooses not to validate them (or take into account the results of the validation), then yes, he's exposing himself to a security risk. Whether this happens with RPM or DEB makes no difference whatsoever.

At least that will be fixed with RPM-format in Meego as talked before.
http://fedoranews.org/tchung/gpg/
(later, when everything is set up, developer just builds automatically signed packages from spec-file or tarball or src.rpm-file.)
$ rpmbuild -ba --sign newpackage.spec
Again, in what way is this different from what debsign does ? In fact a while back uploading to the autobuilder required the package to be signed. I can understand people being more familiar/preferring one package format/manager, but please, please don't dismiss other formats because you're not familiar with them, it really helps no one.
__________________
Blogging about mobile linux - The Penguin Moves!
Maintainer of PyQt (see introduction and docs), AppWatch, QuickBrownFox, etc
 

The Following 2 Users Say Thank You to attila77 For This Useful Post:
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#235
Originally Posted by attila77 View Post
I still understand what *package format* related security problem you're referring to. RPM and DEB are equal in that regard. If you choose not to sign your packages, or the user chooses not to validate them (or take into account the results of the validation), then yes, he's exposing himself to a security risk. Whether this happens with RPM or DEB makes no difference whatsoever.
And I still have to disagree.

I agree, that building GPG-signed packages can be said to be as easy or difficult in both RPM- and DEB-systems, although with rpmbuild one can do it at the same time as the building itself (--sign option), and in DEB-system developer has to use either script or two commands (dpkg-buildpackage and debsign). For developer either way should not be a problem.

But for developer, it should be a MUST to know, that (GPG) signing is nowadays necessary whenever anything is exported and that signature has to be found in the same place where the data of the package, or otherwise many users do not bother about security, and it can kickback troubles also upstream to the developer her/himself if there was trojan added somewhere in the middle.

But for a package user, there definitely IS difference, in favour of RPM over DEB.

Because RPM has the GPG signature embedded, once the signature is added, it follows the package always, whether is it offered in the web2-forum, on a usb-stick, by bluetooth, or in skype-chat, and so on.

When installing rpm package, with lower level program rpm, or with yum, or with apt (yes, apt-tools were used in Fedora before), it always checks the GPG-signature and checksums unless explicitly told not to. If GPG-public key is not in the local database or unable to be automatically retrieved, all programs will complain. Also there is a warning, don't right now remember in which state of GPG-key importing, if GPG-key itself is not seen as "trusted".

Many rpm-users, including me, will send reminders to those RPM-package makers, who forgot to sign their packages. There seldom is any good excuses why it is left unsigned. Also many complain if corresponding GPG-public key is not found from key-servers. It has become just the thing to do in RPM-based systems - installable RPM-package either has signature or otherwise the packager or developer has done something wrong.

Included GPG-signatures have automatically created better security culture in what it comes to manual package installations and upgrades in RPM-based systems. Ordinary people laziness is pre-emptively tackled better.

Just look in my previous post in this talk thread. And there developers are starting somewhat from scratch developing something new and the security is compromised right from the cradle. The deb package there didn't have signatures, neither embedded or separately (at least not yet).

In these maemo.org talk-forums, one can find lots of instructions how to load deb-package directly and install it with dpkg.
I googled those abit:
http://www.google.com/search?q=site%...dpkg+-i%22+deb
And tried a random sample of deb-files. None of them had signatures embedded or offered by side.

Having RPM-packages there instead of those DEB-packages, the probability having authenticity in them would be high (my experience on the developer/user community places where RPM-packages are exported)

You before threw something like 99.99% cases deb-system manages fine although it doesn't have GPG-signatures embedded. It is hard to believe, just looking these maemo.org talk and garage-pages. When apt-get is used, there is no problem as long the deb-package is not then distributed futher without Release.* files.



I can understand people being more familiar/preferring one package format/manager, but please, please don't dismiss other formats because you're not familiar with them, it really helps no one.
"Dislike" was maybe a too strong word. I use and partly maintain daily both Fedora (RPM) and Ubuntu (DEB) Linux-hosts/servers. My N900 has DEB-based system, and I appreciate a lot that Debian has those ported ARM-repositories for many cool programs easily accessible. I like the more "leeding edge" culture Fedora has although it sometimes affects some "bleeding" also, but I like Ubuntu too because it does have some programs packaged which Fedora does not have without repackaging currently.

I remember talking about this 7 years ago first time with Debian activists, that they should embed GPG-signatures in the packages also and not just to the list of packages on the repository (Release.gpg). I see same practical security problems today, what were already then. Then they were sure the coming signing of DSC-files would solve the remaining problems which they agreed then also. Well... signatures should be embedded in the packages still, just because people use them "wrong" sometimes after the apt-get.

Even if one wouldn't see any difference in trust levels of RPM and DEB, and technically higher level package-managers DO provide the same features, one should appreciate LSB's decisions and recommendations. I do not currently see any other reason for Debian not to transit from DEB-system to RPM-system but stubborness. In LSB-wise, alien restricts alot, and LSB has been forced to restrict features from modern RPM because of that to LSB-RPM-format.

Game and many other commercial developers still see Linux-system as too shattered and diversed platform.

The importance of wide standards should be understood by Linux-developers everywhere. (LSB, opendesktop.org, Linux Foundation) Without some pain, compromises, there is no gain.

Last edited by zimon; 2010-03-23 at 03:07.
 
Posts: 149 | Thanked: 140 times | Joined on Sep 2009 @ YUL
#236
I frankly have a headache after reading through this technical discussion. I would like to understand nonetheless. What is the security threat to my computer if only install application from the official Debian repos ? What is the purpose of signing package then ? Is that not something useful only to third party developers and/or when there is no official repo ? All this to say I really don't see the point of a "GPG-signature like feature" for a distro like Debian (and will gladly plaid my ignorance on the subject).

@zimon

Is there an example of a major distro switching from deb to rpm ?
__________________
Questions and answers on Maemo 5, the N900 and MeeGo @ http://wiki.maemo.org/What_can_we_realistically_expect
 
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#237
Originally Posted by Mandor View Post
I frankly have a headache after reading through this technical discussion. I would like to understand nonetheless. What is the security threat to my computer if only install application from the official Debian repos ?
Close to nil, if apt-tools are used.
If you download deb-package with firefox, MicroB, wget, or with lynx/lftp/ncftp, and then install it with dpkg, then all bets are off, because there may be a MITM-attack on you and you really do not get the deb package from the official repository after all although it seems so. You have no way to check the authenticity of that unsigned deb-file, so it can be a Trojan horse which you will install.


What is the purpose of signing package then ? Is that not something useful only to third party developers and/or when there is no official repo ? All this to say I really don't see the point of a "GPG-signature like feature" for a distro like Debian (and will gladly plaid my ignorance on the subject).
Not recomended to do this
http://www.google.com/search?q=site%...dpkg+-i%22+deb

That is, when you have unsigned package, you should not offer it futher, or install or extract unsigned package straight with wget + dpkg -i

The talk.maemo.org is full of instructions though to install unsigned packages just by downloading them and with dpkg.

That's why current "de-facto" DEB-security policy is unefficient, as it has been for years.


Is there an example of a major distro switching from deb to rpm ?
Don't remember. I do know, all LSB founding members had to make lots of changes and compromises as none of them were LSB-compliant themselves then. Well they still do and will do compromises and sometimes difficult decisions.
http://www.linuxfoundation.org/about/members

Last edited by zimon; 2010-03-23 at 23:31. Reason: a method, how repository is used, is essential in DEB-systems
 

The Following User Says Thank You to zimon For This Useful Post:
Posts: 3,319 | Thanked: 5,610 times | Joined on Aug 2008 @ Finland
#238
Zimon, sorry, we won't agree on this one. You dislike certain policies and developers (not) adhering to them, and that's ok. But that still has nothing to do with the package format, none of the things you described have. You could just well be notifying deb maintainers to sign packages, warn people about not installing random unsigned packages, change apt defaults, etc. It's like saying BMW cars are safety hazards because you saw one speeding last week. Changing the make of the car won't automatically make the driver more safety conscious.
__________________
Blogging about mobile linux - The Penguin Moves!
Maintainer of PyQt (see introduction and docs), AppWatch, QuickBrownFox, etc
 
Posts: 1,341 | Thanked: 708 times | Joined on Feb 2010
#239
Without changing the package format, Debian could fix this security problem by embedding GPG signature with debsigs to all packages it provides from its repositories. (Like Fedora does) People, like it is shown here in talk.maemo.org, will download packages with different tools skipping over the important authenticy check apt-tools would do.

http://packages.debian.org/sid/devel/debsigs
http://manpages.ubuntu.com/manpages/...ebsigs.1p.html

Current dpkg versions, I believe, will check the GPG-signature if it is embedded in DEB-file? dpkg manual page tells there is --no-debsig, so I assume if that option is not used, the embedded GPG signature and the package itself is checked for authenticity like rpm program does unless --nosignature option is given. So user does not have to manually check with debsigs-verify?

Or I am assuming wrong, and dpkg can't handle embedded GPG signatures anyway?

Couldn't find debsigs or debsigs-verify for ARM though, so I am not sure at all if dpkg in N900 will handle embedded GPG-signatures.

Or, then again, Debian could make a world a favour and change to RPM-system so in LSB-RPM modern features could be added not worrying alien won't support them.

Last edited by zimon; 2010-03-24 at 23:46. Reason: better link
 
Posts: 3,319 | Thanked: 5,610 times | Joined on Aug 2008 @ Finland
#240
Originally Posted by zimon View Post
Or, then again, Debian could make a world a favour and change to RPM-system so in LSB-RPM modern features could be added not worrying alien won't support them.
Zimon, please, for the last time - let Debian folks care about Deb(ian). Free and Open Source Software is not about telling *other* people what and how they should use.
__________________
Blogging about mobile linux - The Penguin Moves!
Maintainer of PyQt (see introduction and docs), AppWatch, QuickBrownFox, etc
 

The Following 2 Users Say Thank You to attila77 For This Useful Post:
Reply

Tags
rabble-rousing, rpm vs. deb war, rpmligion vs debligion, vote attila77


 
Forum Jump


All times are GMT. The time now is 18:21.