mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-28 16:59:40 -05:00
Improve guidelines for verifying Qubes repos
- Generalize section from "code" to "repos" (We also have doc repos.) - Clarify tag and commit signing - Warn against adding commits on top of unsigned commits - Warn against trusting GitHub's interface for signature verification Closes QubesOS/qubes-issues#3962
This commit is contained in:
parent
e4ba1095ea
commit
7815f4a7bd
@ -133,7 +133,7 @@ This website is hosted via GitHub Pages behind Cloudflare ([why?](#why-does-this
|
|||||||
Therefore, it is largely outside of our control.
|
Therefore, it is largely outside of our control.
|
||||||
We don't consider this a problem, however, since we explicitly [distrust the infrastructure](#what-does-it-mean-to-distrust-the-infrastructure).
|
We don't consider this a problem, however, since we explicitly [distrust the infrastructure](#what-does-it-mean-to-distrust-the-infrastructure).
|
||||||
For this reason, we don't think that anyone should place undue trust in the live version of this site on the Web.
|
For this reason, we don't think that anyone should place undue trust in the live version of this site on the Web.
|
||||||
Instead, if you want to obtain your own, trustworthy copy of this website in a secure way, you should clone our [website repo](https://github.com/QubesOS/qubesos.github.io), [verify the PGP signatures on the commits and/or tags](/security/verifying-signatures/#how-to-verify-qubes-code) (signed by the [doc-signing keys](https://github.com/QubesOS/qubes-secpack/tree/master/keys/doc-signing)), then either [render the site on your local machine](https://github.com/QubesOS/qubesos.github.io/blob/master/README.md#instructions) or simply read the source, the vast majority of which was [intentionally written in Markdown so as to be readable as plain text for this very reason](/doc/doc-guidelines/#markdown-conventions).
|
Instead, if you want to obtain your own, trustworthy copy of this website in a secure way, you should clone our [website repo](https://github.com/QubesOS/qubesos.github.io), [verify the PGP signatures on the commits and/or tags](/security/verifying-signatures/#how-to-verify-qubes-repos) (signed by the [doc-signing keys](https://github.com/QubesOS/qubes-secpack/tree/master/keys/doc-signing)), then either [render the site on your local machine](https://github.com/QubesOS/qubesos.github.io/blob/master/README.md#instructions) or simply read the source, the vast majority of which was [intentionally written in Markdown so as to be readable as plain text for this very reason](/doc/doc-guidelines/#markdown-conventions).
|
||||||
We've gone to special effort to set all of this up so that no one has to trust the infrastructure and so that the contents of this website are maximally available and accessible.
|
We've gone to special effort to set all of this up so that no one has to trust the infrastructure and so that the contents of this website are maximally available and accessible.
|
||||||
|
|
||||||
### What does it mean to "distrust the infrastructure"?
|
### What does it mean to "distrust the infrastructure"?
|
||||||
|
@ -37,6 +37,7 @@ By verifying all the files we download that purport to be authored by a party we
|
|||||||
However, for digital signatures to make any sense, we must ensure that the public keys we use for signature verification are indeed the original ones.
|
However, for digital signatures to make any sense, we must ensure that the public keys we use for signature verification are indeed the original ones.
|
||||||
Anybody can generate a GPG key pair that purports to belong to "The Qubes Project," but of course only the key pair that we (i.e., the Qubes developers) generated is the legitimate one.
|
Anybody can generate a GPG key pair that purports to belong to "The Qubes Project," but of course only the key pair that we (i.e., the Qubes developers) generated is the legitimate one.
|
||||||
The next section explains how to verify the validity of the Qubes signing keys in the process of verifying a Qubes ISO.
|
The next section explains how to verify the validity of the Qubes signing keys in the process of verifying a Qubes ISO.
|
||||||
|
(However, the same general principles apply to all cases in which you may wish to verify a PGP signature, such as [verifying code], not just verifying ISOs.)
|
||||||
|
|
||||||
|
|
||||||
How to Verify Qubes ISO Signatures
|
How to Verify Qubes ISO Signatures
|
||||||
@ -289,12 +290,14 @@ The signature is good.
|
|||||||
If our copy of the `Qubes OS Release X Signing Key` is being validated by the authentic Qubes Master Signing Key (see [above][QMSK]), we can be confident that these hash values came from the Qubes devs.
|
If our copy of the `Qubes OS Release X Signing Key` is being validated by the authentic Qubes Master Signing Key (see [above][QMSK]), we can be confident that these hash values came from the Qubes devs.
|
||||||
|
|
||||||
|
|
||||||
How to Verify Qubes Code
|
How to Verify Qubes Repos
|
||||||
------------------------
|
-------------------------
|
||||||
|
|
||||||
Developers who fetch code from our Git server should always verify the PGP signature of the tag on the latest commit.
|
Whenever you use one of the [Qubes repositories], you should verify the PGP signature in a tag on the latest commit or on the latest commit itself.
|
||||||
In some cases, commits themselves may also be signed.
|
(One or both may be present, but only one is required.)
|
||||||
Any unsigned commit that is not followed by a signed tag should not be trusted!
|
If there is no trusted signed tag or commit on top, any commits after the latest trusted signed tag or commit should **not** be trusted.
|
||||||
|
If you come across a repo with any unsigned commits, you should not add any of your own signed tags or commits on top of them unless you personally vouch for the trustworthiness of the unsigned commits.
|
||||||
|
Instead, ask the person who pushed the unsigned commits to sign them.
|
||||||
|
|
||||||
To verify a signature on a Git tag:
|
To verify a signature on a Git tag:
|
||||||
|
|
||||||
@ -312,6 +315,12 @@ or
|
|||||||
|
|
||||||
$ git verify-commit <commit ID>
|
$ git verify-commit <commit ID>
|
||||||
|
|
||||||
|
You should always perform this verification on a trusted local machine with properly validated keys (which are available in the [Qubes Security Pack]) rather than relying on a third party, such as GitHub.
|
||||||
|
While the GitHub interface may claim that a commit has a verified signature from a member of the Qubes team, this is only trustworthy if GitHub has performed the signature check correctly, the account identity is authentic, the user's key has not been replaced by an admin, GitHub's servers have not been compromised, and so on.
|
||||||
|
Since there's no way for you to be certain that all such conditions hold, you're much better off verifying signatures yourself.
|
||||||
|
|
||||||
|
Also see: [Distrusting the Infrastructure]
|
||||||
|
|
||||||
|
|
||||||
Troubleshooting FAQ
|
Troubleshooting FAQ
|
||||||
-------------------
|
-------------------
|
||||||
@ -422,6 +431,7 @@ If you still have a question, please address it to the [qubes-users mailing list
|
|||||||
|
|
||||||
[website-trust]: /faq/#should-i-trust-this-website
|
[website-trust]: /faq/#should-i-trust-this-website
|
||||||
[Distrusting the Infrastructure]: /faq/#what-does-it-mean-to-distrust-the-infrastructure
|
[Distrusting the Infrastructure]: /faq/#what-does-it-mean-to-distrust-the-infrastructure
|
||||||
|
[verifying code]: #how-to-verify-qubes-repos
|
||||||
[Qubes Master Signing Key]: https://keys.qubes-os.org/keys/qubes-master-signing-key.asc
|
[Qubes Master Signing Key]: https://keys.qubes-os.org/keys/qubes-master-signing-key.asc
|
||||||
[keyserver]: https://en.wikipedia.org/wiki/Key_server_%28cryptographic%29#Keyserver_examples
|
[keyserver]: https://en.wikipedia.org/wiki/Key_server_%28cryptographic%29#Keyserver_examples
|
||||||
[Downloads]: /downloads/
|
[Downloads]: /downloads/
|
||||||
@ -435,6 +445,7 @@ If you still have a question, please address it to the [qubes-users mailing list
|
|||||||
[RSK]: #2-get-the-release-signing-key
|
[RSK]: #2-get-the-release-signing-key
|
||||||
[signature file]: #3-verify-your-qubes-iso
|
[signature file]: #3-verify-your-qubes-iso
|
||||||
[digest file]: #how-to-verify-qubes-iso-digests
|
[digest file]: #how-to-verify-qubes-iso-digests
|
||||||
|
[Qubes repositories]: https://github.com/QubesOS
|
||||||
[GPG documentation]: https://www.gnupg.org/documentation/
|
[GPG documentation]: https://www.gnupg.org/documentation/
|
||||||
[qubes-users mailing list]: /support/#qubes-users
|
[qubes-users mailing list]: /support/#qubes-users
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user