From: Giovanni Biscuolo <g@xelera.eu>
To: zimoun <zimon.toutoune@gmail.com>,
"Ludovic Courtès" <ludovic.courtes@inria.fr>,
guix-devel@gnu.org
Subject: Re: Tricking peer review
Date: Wed, 20 Oct 2021 10:22:45 +0200 [thread overview]
Message-ID: <87czo0m7fu.fsf@xelera.eu> (raw)
In-Reply-To: <86ee8hfm1k.fsf@gmail.com>
[-- Attachment #1: Type: text/plain, Size: 2735 bytes --]
Hi Simon and Ludovic,
very interesting thread, thank you!
I think the "final" result of this discussion should be condensed in a
few (one?) additional paragraphs in the Contributing section of the Guix
manual
zimoun <zimon.toutoune@gmail.com> writes:
[...]
> - url-fetch: the attacker has to introduce the tarballs into SWH.
> There is not so much means, from my understanding: SWH ingests
> tarballs via loaders, for instance gnu.org or sources.json or
> debian.org etc. Therefore the attacker has to introduce the malicious
> code to these platforms.
>
> - url-fetch without metadata (as your example), indeed, the reviewer
> could be abused; mitigated by the fact that “guix lint” spots the
> potential issue.
>
> - url-fetch with metadata: the attacker have to also corrupt
> Diasarchive-DB. Otherwise, the tarball returned by SWH will not
> match the checksum.
>
> - svn-fetch, hg-fetch, cvs-fetch: no attack possible, yet.
>
> - git-fetch: it is the *real* issue. Because it is easy for the
> attacker to introduce malicious code into SWH (create a repo on
> GitHub, click Save, done). Then submit a package using it as you
> did. It is the same case as url-fetch without metadata but easier
> for the attacker. It is mitigated by “guix lint”.
Well done Simon: AFAIU this is a complete analisys of the possible
"source" attacks, or is something missing?
> That’s said, if I am an attacker and I would like to corrupt Guix, then
> I would create a fake project mimicking a complex software. For
> instance, Gmsh is a complex C++ scientific software. The correct URL is
> <https://gmsh.info> and the source at
> <https://gitlab.onelab.info/gmsh/gmsh>. Then, as an attacker, I buy the
> domain say gmsh.org
or onelab.org, onehab.info and also set up a https://onehab.info web
site identical to the legitimate one just to trick people
> and put a malicious code there. Last, I send for
> inclusion a package using this latter URL. The reviewer would be
> abused.
> That’s why more eyes, less issues. :-)
I agree, but eyes should also be aware of this class of possible attacks
>> Also, just because a URL looks nice and is reachable doesn’t mean the
>> source is trustworthy either. An attacker could submit a package for an
>> obscure piece of software that happens to be malware. The difference
>> here is that the trick above would allow targeting a high-impact
>> package.
>
> I agree.
I also agree (obviously) and I think this kind of attack should also be
documented in the manual (if not already done)
[...]
Thanks! Gio'
--
Giovanni Biscuolo
Xelera IT Infrastructures
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 849 bytes --]
next prev parent reply other threads:[~2021-10-20 8:23 UTC|newest]
Thread overview: 63+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-10-15 18:54 Tricking peer review Ludovic Courtès
2021-10-15 22:03 ` Liliana Marie Prikler
2021-10-15 22:28 ` Ryan Prior
2021-10-15 22:45 ` Liliana Marie Prikler
2021-10-15 22:59 ` Ryan Prior
2021-10-18 7:40 ` Ludovic Courtès
2021-10-18 19:56 ` Ryan Prior
2021-10-19 8:39 ` zimoun
2021-10-20 23:03 ` Leo Famulari
2021-10-21 8:14 ` zimoun
2021-10-15 23:13 ` Thiago Jung Bauermann
2021-10-18 7:47 ` Ludovic Courtès
2021-10-18 7:34 ` Ludovic Courtès
2021-10-19 8:36 ` zimoun
2021-10-19 12:56 ` Ludovic Courtès
2021-10-19 14:22 ` zimoun
2021-10-19 15:41 ` Incentives for review Ludovic Courtès
2021-10-19 16:56 ` zimoun
2021-10-19 19:14 ` Ricardo Wurmus
2021-10-19 19:34 ` Christine Lemmer-Webber
2021-10-19 19:50 ` Joshua Branson
2021-10-21 20:03 ` Ludovic Courtès
2021-10-20 21:37 ` Thiago Jung Bauermann
2021-10-21 13:38 ` Artem Chernyak
2021-10-22 20:03 ` Thiago Jung Bauermann
2021-10-23 1:43 ` Kyle Meyer
2021-10-23 3:42 ` Thiago Jung Bauermann
2021-10-23 7:37 ` zimoun
2021-10-23 16:18 ` public-inbox/elfeed -> Maildir bridge (was: Incentives for review) Kyle Meyer
2021-10-24 12:18 ` Jonathan McHugh
2021-10-21 16:06 ` Incentives for review Ricardo Wurmus
2021-10-21 16:32 ` zimoun
2021-10-22 20:06 ` Thiago Jung Bauermann
2021-10-21 15:07 ` Katherine Cox-Buday
2021-10-21 16:10 ` Ricardo Wurmus
2021-10-21 17:52 ` Katherine Cox-Buday
2021-10-21 18:21 ` Arun Isaac
2021-10-21 19:58 ` Ludovic Courtès
2021-10-21 21:42 ` Ricardo Wurmus
2021-10-22 10:48 ` Arun Isaac
2021-10-22 11:21 ` zimoun
2021-10-23 6:09 ` Arun Isaac
2021-10-22 10:56 ` Jonathan McHugh
2021-10-22 7:40 ` zimoun
2021-10-22 11:09 ` Arun Isaac
2021-10-22 8:37 ` Jonathan McHugh
2021-10-22 9:15 ` zimoun
2021-10-22 10:40 ` Jonathan McHugh
2021-10-22 11:32 ` zimoun
2021-10-21 21:18 ` Jonathan McHugh
2021-10-22 10:44 ` Arun Isaac
2021-10-22 11:06 ` Jonathan McHugh
2021-10-21 21:22 ` zimoun
2021-10-28 14:57 ` Katherine Cox-Buday
2021-10-21 17:51 ` Vagrant Cascadian
2021-10-24 11:47 ` Efraim Flashner
2021-10-20 8:22 ` Giovanni Biscuolo [this message]
2021-10-20 9:10 ` Tricking peer review zimoun
2021-10-20 8:29 ` patches for new packages proper workflow (Re: Tricking peer review) Giovanni Biscuolo
2021-10-20 23:09 ` Tricking peer review Leo Famulari
2021-10-21 7:12 ` Ludovic Courtès
2021-10-25 13:09 ` Christine Lemmer-Webber
2021-10-28 8:38 ` Ludovic Courtès
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87czo0m7fu.fsf@xelera.eu \
--to=g@xelera.eu \
--cc=guix-devel@gnu.org \
--cc=ludovic.courtes@inria.fr \
--cc=zimon.toutoune@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.