LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 04-06-2012, 12:59 PM   #1
slackgraham
LQ Newbie
 
Registered: Apr 2012
Posts: 13

Rep: Reputation: Disabled
checksum/signature/whatever for sbopkg ?


Hi All,

I thought I'd give sbopkg a go, but I don't see any checksums, or even better signatures, to enable checking that the download is authentic.

Am I missing something?

Thanks,
g.
 
Old 04-06-2012, 01:25 PM   #2
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,097

Rep: Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174
for slackbuilds.org's official http repository, each slackbuilds is extracted before building from a .tar.gz signed with pgp (the .asc files, like /var/lib/sbopkg/SBo/13.37/libraries/libvpx.tar.gz.asc).

in case of a git repository, everything is signed and hashed in the repository itself (by design), so there's no need to verify manually with pgp.

Last edited by ponce; 04-06-2012 at 01:31 PM.
 
Old 04-06-2012, 03:23 PM   #3
slackgraham
LQ Newbie
 
Registered: Apr 2012
Posts: 13

Original Poster
Rep: Reputation: Disabled
Thanks for the response.

Yes, I'm familiar with the .asc files at sbo. That's what I was expecting at http://www.sbopkg.org/downloads.php.

Quote:
in case of a git repository, everything is signed and hashed in the repository itself (by design), so there's no need to verify manually with pgp.
I'm not familiar with git, but a quick google seems to suggest that signing tags is optional.
However, even if it wasn't optional, the actual download of the "prebuilt package" at http://www.sbopkg.org/downloads.php comes straight over http, with git not involved. So without an accompanying signature how can I know that I've downloaded the authentic package which has come out of a secure(?) git repository?

What am I missing?!

Ah, I've found sha1 checksums if I download from this page http://code.google.com/p/sbopkg/downloads/list, which thinking about it doesn't add much in terms of verifying package authenticity, because I can't tell whether the hash value itself is authentic. Doh!
 
Old 04-06-2012, 04:00 PM   #4
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,097

Rep: Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174
Quote:
Originally Posted by slackgraham View Post
I'm not familiar with git, but a quick google seems to suggest that signing tags is optional.
every commit is signed.

sorry, I had understood you were referring at the repositories sbopkg uses, not at sbopkg itself.
Just two considerations:
- the upload is by slakmagik, I can read his name, he logged in and Google guarantees that's he is himself;
- I think the sha1 hash value is calculated by googlecode.
 
Old 04-08-2012, 04:38 PM   #5
slackgraham
LQ Newbie
 
Registered: Apr 2012
Posts: 13

Original Poster
Rep: Reputation: Disabled
Hello again, thanks for your reply.

Quote:
every commit is signed.
Interesting. I'll have to take a closer look at git (especially given its increasing popularity; I mostly use bazaar).

Quote:
sorry, I had understood you were referring at the repositories sbopkg uses, not at sbopkg itself.
Just two considerations:
- the upload is by slakmagik, I can read his name, he logged in and Google guarantees that's he is himself;
- I think the sha1 hash value is calculated by googlecode.
OK. yes, that is some assurance.
I guess my point is that from the web interface everything looks ok, but really I could be being served with anything, from anywhere, and without a key or hash from some ultimately trusted source I can't tell.
Still, not a completely unusual state of affairs (I suppose I'd expected signatures on something that plays such a critical role in the system, especially since sbopkg expects signatures on the sbo downloads).

Thanks for your replies,

g.
 
Old 04-08-2012, 04:54 PM   #6
wildwizard
Member
 
Registered: Apr 2009
Location: Oz
Distribution: slackware64-14.0
Posts: 875

Rep: Reputation: 282Reputation: 282Reputation: 282
Quote:
Originally Posted by slackgraham View Post
I guess my point is that from the web interface everything looks ok, but really I could be being served with anything, from anywhere, and without a key or hash from some ultimately trusted source I can't tell.
And how would you tell that the person signing it is trustworthy?

Think long and hard about that question.
 
Old 04-08-2012, 05:05 PM   #7
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,097

Rep: Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174
I, personally, see it like this: if the sbopkg devs think the tarball is ok, I simply trust them and that's enough.

being an user of sbopkg since some years, it actually saved a lot of my time: now I just can't think of a world without it and slackbuilds.org.
 
Old 04-14-2012, 04:58 PM   #8
slackgraham
LQ Newbie
 
Registered: Apr 2012
Posts: 13

Original Poster
Rep: Reputation: Disabled
Quote:
And how would you tell that the person signing it is trustworthy?
Chain of trust etc.. fair enough.
But surely a suspect key is easier to detect than a suspect file?
After all, (i) if a key has been used over a period of time then a different key would be detected by the community.
And (ii) keys can be published in multiple places, which makes it harder to publish a fake key than to publish, for example, a single fake download.

And once I've decided to trust a key, then by implication I can trust future files signed with the same key, rather than examine each file anew.

What approach do you take?


Quote:
I, personally, see it like this: if the sbopkg devs think the tarball is ok, I simply trust them and that's enough.
I trust the devs alright, just concerned about whether the tarball they produced is the same thing I download..

Quote:
being an user of sbopkg since some years, it actually saved a lot of my time: now I just can't think of a world without it and slackbuilds.org.
I can see the value alright
I just take a cautious approach to what I install.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
sbopkg help rng Slackware 6 03-16-2012 09:32 AM
Sbopkg... Alexvader Slackware 24 11-23-2009 11:38 AM
Sbopkg error adriv Slackware 5 04-09-2009 04:11 PM
Checksum 4 Slackware download - what type of checksum is this. Earnest Lux Linux - Newbie 1 02-02-2008 08:02 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 09:21 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration