-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA-376240: Check signature of driver disks/supp packs during host installation #134
base: release/xs8
Are you sure you want to change the base?
Conversation
The key specified in updates.xml will already be present as they are installed as part of the main installation before supp packs are installed.
How would someone do that practically if supp packs are applied during installation? |
It looks like a strong regression. If the support pack is signed on its own when is the key installed in the code? Only the keys from the main repository are installed as far as I can see. The best thing would be that the installer itself came with the right keys and check everything without having to trust the repositories but at the moment the keys are installed from main repository assuming they are safe. |
In my testing, I booted to a shell and then added the key, for an automated test environment the keys would need to be included in the main installation media - this might be impractical for now so we may need an alternative strategy for including the keys |
Maybe a hidden debug option that can be passed on the command-line to revert back to the old behaviour? |
There are some changes from xcp-ng that do something like that: |
What improvement does this give? If the user does not trust the ISO it would result in importing an attacker key on the host, so anyway the user must check the ISO integrity before using it (i.e. manually checking a gpg sig). And then I'd say all imaginable checks are already encompassed by that ISO integrity check. |
Note that for the same reasons as exposed above, I tend to think At worst, adding security features in the wrong places even give the users a false sense of security, and can lead them to take wrong decisions (ie. not checking the the integrity of the ISO "because there are sig checks already") |
Having the main repository in the same ISO is only an option. If your main repository is on HTTP or FTP and you can check the signature from a key that comes with the installer you can't tamper with unsafe repositories. |
Right, and that's what we had added in 8.2. OTOH, checking sigs when the repo is in the ISO causes issues when the user wants to customize the install media - roughly the same ones as those mentioned above with driver disks signed with a key unknown to the installer. |
The GPG key is specified in the updates.xml of the supplemental pack to install.
The key will already be present on the host as keys are installed as part of the main installation before the supp packs are installed.
During test deployments any test/dev keys must be loaded before the supp packs/driver disks are installed.
Tested on XenServer 8