Bug 1084721 - Gluster RPMs for CentOS/etc from download.gluster.org are not consistently signed
Summary: Gluster RPMs for CentOS/etc from download.gluster.org are not consistently si...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: GlusterFS
Classification: Community
Component: core
Version: 3.4.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: GlusterFS Bugs list
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-04-05 22:31 UTC by Kurt Seifried
Modified: 2014-10-16 16:14 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-10-16 16:14:51 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Embargoed:


Attachments (Terms of Use)

Description Kurt Seifried 2014-04-05 22:31:05 UTC
Description of problem:

version 3.4.2 and 3.4.4 RPM's downloaded from:

https://download.gluster.org/pub/gluster/glusterfs/3.4/3.4.2/CentOS/epel-6.5/x86_64/

https://download.gluster.org/pub/gluster/glusterfs/3.4/3.4.3/CentOS/epel-6.5/x86_64/

They are signed but by different keys:

# rpm -Kv glusterfs-libs-3.4.2-1.el6.x86_64.rpm
glusterfs-libs-3.4.2-1.el6.x86_64.rpm:
    Header V4 RSA/SHA1 Signature, key ID 89ccae8b: OK
    Header SHA1 digest: OK (6ddb5e595a766c034eba9b5314746d32e83f75ee)
    V4 RSA/SHA1 Signature, key ID 89ccae8b: OK
    MD5 digest: OK (30c03a99f376bd4faa54c43bdb0aaffc)

# rpm -Kv glusterfs-libs-3.4.3-2.el6.x86_64.rpm 
glusterfs-libs-3.4.3-2.el6.x86_64.rpm:
    Header V4 RSA/SHA1 Signature, key ID 4ab22bb3: NOKEY
    Header SHA1 digest: OK (a608c3b9c2633b063310910d4ddaecbe33a4574e)
    V4 RSA/SHA1 Signature, key ID 4ab22bb3: NOKEY
    MD5 digest: OK (d1fa7523d3363047d583218ec0944dee)

Is this intentional? Why are they signed at all if the key being used keeps changing? Are they meant to be "properly" signed or are they signed by the (I assume developers?) so that we can claim we are not shipping unsigned RPMs?

Adding Security keyword as we (SRT) should probably figure out what is going on and make sure it's safe/documented/whatever.

Comment 1 Kurt Seifried 2014-04-05 22:35:33 UTC
So one concern: this either forces people using the gluster packages from download.gluster.org to either install several GPG keys of unknown safety (they are on developer machines? An internet connected server? Who knows?) or to disable checks for GPG signatures on the packages from downloads.gluster.org if they want to install/updates the packages (which they would). Both (especially the disabling of signatures) make it much easier for an attacker that compromises download.gluster.org to then insert rpms such as a kernel rpm or openssh rpm with modified contents that are then installed on the victims systems.

Comment 2 Kaleb KEITHLEY 2014-10-16 16:14:51 UTC
yup, the keys changed.

They haven't changed since. You seem to be inventing a problem that doesn't exist, i.e. continuously changing.

Closing as not a bug.


Note You need to log in before you can comment on or make changes to this bug.