From mboxrd@z Thu Jan 1 00:00:00 1970 From: ludo@gnu.org (Ludovic =?UTF-8?Q?Court=C3=A8s?=) Subject: bug#27437: Source downloader accepts X.509 certificate for incorrect domain Date: Thu, 22 Jun 2017 09:57:23 +0200 Message-ID: <87zid0qwt8.fsf@gnu.org> References: <20170621061752.GA32412@jasmine.lan> <87lgolipi0.fsf@gnu.org> <20170622040901.GA8700@jasmine.lan> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:40227) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dNx09-0001ed-Qn for bug-guix@gnu.org; Thu, 22 Jun 2017 03:58:06 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dNx06-0000gS-Lg for bug-guix@gnu.org; Thu, 22 Jun 2017 03:58:05 -0400 Received: from debbugs.gnu.org ([208.118.235.43]:57891) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1dNx06-0000gO-Ho for bug-guix@gnu.org; Thu, 22 Jun 2017 03:58:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1dNx06-0001ZF-81 for bug-guix@gnu.org; Thu, 22 Jun 2017 03:58:02 -0400 Sender: "Debbugs-submit" Resent-Message-ID: In-Reply-To: <20170622040901.GA8700@jasmine.lan> (Leo Famulari's message of "Thu, 22 Jun 2017 00:09:01 -0400") List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org Sender: "bug-Guix" To: Leo Famulari Cc: 27437@debbugs.gnu.org Leo Famulari skribis: > On Wed, Jun 21, 2017 at 12:50:15PM +0200, Ludovic Court=C3=A8s wrote: >> Leo Famulari skribis: >> > While working on some package updates, I found that the source code >> > downloader will accept an X.509 certificate for an incorrect site. > > [...] > >> IOW, since we=E2=80=99re checking the integrity of the tarball anyway, a= nd we >> assume developers checked its authenticity when writing the recipe, then >> who cares whether downloads.xiph.org has a valid certificate? >>=20 >> Does it make sense? > > Yeah, I think it makes sense if checking the certificates would add too > much complexity for what I think is a minor benefit: protecting against > exploitation of bugs by MITM (but not xiph.org) in whatever code runs > after the connection is initiated and before the hash is calculated. > > Perhaps a MITM could send a huge file and fill up the disk or something > like that. I=E2=80=99m generally in favor of relying on X.509 certificates as little as possible, and in this case, while I agree that it could protect us against the scenario you describe, I think it=E2=80=99s a bit of a stretch. However, we=E2=80=99d very likely have bug reports of people for which down= loads fail because of various issues in the X.509 infrastructure and/or in how the they set up their system (=E2=80=98nss-certs=E2=80=99 uninstalled or to= o old, SSL_CERT_DIR unset, etc.) Thoughts? Thanks, Ludo=E2=80=99.