-
Notifications
You must be signed in to change notification settings - Fork 161
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[INFRA] fix circleci: adding apt keys #910
Conversation
Can we Google these particular keygrips and verify that Ubuntu vouches for them? I'm hesitant to simply fetch keys that are missing, as a tampered package signed with an unofficial key would look the same. |
I tried to google a bit, but searching for example for I also don't fully understand in how far this is a security issue: I thought all we are doing here is adding some "public keys", so that packages, signed with "private keys" can be validated. So for this to become a security issue, someone would have to "capture" the It sounds possible, ... would then maybe the alternative solution from the stackexchange thread be preferable?
BTW: I got the public keys I add in this PR by browsing the CircleCI log. |
The security issue is that we are installing software. The public key verifies that the package we are installing has the same hash as that seen by the holder of the private key, so the security model is "By verifying packages with these public keys, I am trusting the person/machine that holds a corresponding public key would not intentionally package malware." If we simply add a public key because a package was signed with it, then there is no verification. Here's the attack:
Not saying that's what this is, but we should definitely get verified keys, not just do step 5.
If this works, then it is what we should do. It would mean that Debian has intentionally rotated their keys and is attesting to new keys using the old keys. |
Tried it out in ci/keyring: https://app.circleci.com/pipelines/github/bids-standard/bids-specification/3366/workflows/845aae52-fdb1-40e5-9d38-af807144ee86/jobs/9096 Seems |
Thanks Chris, I agree that the best solution would be to update the linkchecker image. Help with that would be much appreciated. |
@yarikoptic would "updating the linkchecker image" involve:
? If yes, maybe we should:
What do y'all think? |
closing, this will be better addressed in #932 |
This PR is intended to fix the CircleCI continuous integration service step. I debugged it when logged into the session via ssh, and this was the fix. I don't know why adding the keys is now needed. It might be a temporary thing. In any case, I don't think it hurts.