Actions

Software Signature Verification Usability Issues and Proposed Solutions

From Whonix



Signatureverification123123.jpg

Problem[edit]

Quote Warning page, Always Verify Signatures:

For greater system security, it is strongly recommended to avoid installing unsigned software. Always make sure that signing keys and signatures are correct and/or use mechanisms that heavily simplify and automate this process, like apt-get upgrades. As a reminder, digital signatures are not a magic bullet. While they increase the certainty that no backdoor was introduced by a third party during transit, this does not mean the software is absolutely "backdoor-free". Learn more about this process and what digital signatures prove.

Surveys (example) have shown that very few users use software signature verification. Even fewer users have a sufficient understanding of the threat model. In case of an attack by an advanced adversary most users would get compromised. This is the very strong opinion of the author of this text. Usually the author of this text seldom raises strong opinions.

Required knowledge is far too much. Usability of tools used for manual verification of software signatures is such as GnuPG is far too bad. For an elaboration of these issues, see Conceptual Challenges in Software Digital Signatures Verification and Verifying Software Signatures.

Solutions[edit]

Metalink[edit]

Metalink are links which support additional metadata. Such as in theory links to signing keys, software signatures. Browser could implement support for metalink and automation of software verification.

Would require Metalink including OpenPGP support.

GSoC may be way to get this feature into Firefox.

Metalink would only be a gradual improvement. Download security is harder than just verification of software signatures. Rollback (downgrade), indefinite freeze attacks and other attacks would still be possible. See TUF Threat Model, TUF: Attacks and Weaknesses [archive] for further information.

OpenPGP Signed Website[edit]

OpenPGP Signed Websites and browsers verifying website signatures do not exist yet either.

Key Distribution[edit]

Even if browsers (such as Firefox, Chrome) and/or downloaders (such as wget, curl, aria2c) had support for metalink and OpenPGP verification there would still be no concept on how to distribute the signing keys. This is a hard problem. TLS has the same issue. The certificate authority (CA) system problem.

DANE [archive] (DNS-based Authentication of Named Entities) might be a way put the root anchor into the DNS but that's no perfect end-to-end authentication either.

Deprecated Ideas[edit]

SecureDownloader[edit]

Introduction[edit]

Deprecated idea.

Stub downloader. Similar to the one that Mozilla is providing for Firefox downloads. A small tool that is used to download and install the real tool.

Securing downloads may be better when written as a general purpose tool (not specific to Whonix ™).

No other projects such as Firefox or Debian support this use case.

Open Questions[edit]

  • How to download and verify the host program in the first place?
    • Without being able to answer this question the thing becomes a circle and doesn't actually solve anything.
  • How to download the secure downloader itself in censored countries?
  • How to download files in censored countries?
  • Torify downloads?

Challanges[edit]

Such a host program is host operating system specific, well you can write it in a cross platform language but still have to struggle with platform specific quirks.

The Tor Project never managed to get such a downloader up and running, see Thandy.

Conclusion[edit]

Not useful. Better to fix the root issue upstream.

Resources[edit]

Footnotes[edit]



Fosshost is sponsors Kicksecure ™ stage server Whonix old logo.png
Fosshost About Advertisements

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: 1024px-Telegram 2019 Logo.svg.png Discourse logo.png Matrix logo.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Software Signature Verification Usability Issues and Proposed Solutions&body=https://www.whonix.org/wiki/Software_Signature_Verification_Usability_Issues_and_Proposed_Solutions link=https://reddit.com/submit?url=https://www.whonix.org/wiki/Software_Signature_Verification_Usability_Issues_and_Proposed_Solutions&title=Software Signature Verification Usability Issues and Proposed Solutions link=https://news.ycombinator.com/submitlink?u=https://www.whonix.org/wiki/Software_Signature_Verification_Usability_Issues_and_Proposed_Solutions&t=Software Signature Verification Usability Issues and Proposed Solutions link=https://mastodon.technology/share?message=Software Signature Verification Usability Issues and Proposed Solutions%20https://www.whonix.org/wiki/Software_Signature_Verification_Usability_Issues_and_Proposed_Solutions&t=Software Signature Verification Usability Issues and Proposed Solutions

Love Whonix ™ and want to help spread the word? You can start by telling your friends or posting news about Whonix ™ on your website, blog or social media.

https link onion link Priority Support | Investors | Professional Support

Whonix | © ENCRYPTED SUPPORT LP | Heckert gnu.big.png Freedom Software / Osi standard logo 0.png Open Source (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.