NO_PUBKEY D85722140244C327 and no way to verify it
#486
Closed
opened 7 years ago by hkmaly
·
11 comments
No Branch/Tag Specified
master
release
theme-hidpi
27.9_RelBranch
27.8_RelBranch
27.7_RelBranch
27.6_RelBranch
27.5_RelBranch
27.4_RelBranch
27.3_RelBranch
27.2_RelBranch
27.1_RelBranch
27.0_RelBranch
26.5_Atom_RelBranch
Atom
26.5_RelBranch
v26_Dev
v25-LTS
26.4_Atom_RelBranch
26.4_RelBranch
26.3_Atom_RelBranch
26.3_RelBranch
26.2_Atom_RelBranch
26.2_RelBranch
26.1_Atom_RelBranch
26.1_RelBranch
26.0_Atom_RelBranch
26.0_RelBranch
25.8_Atom_Relbranch
25.8_RelBranch
v25_Atom
v25_Dev
25.7_Atom_Relbranch
25.7_RelBranch
25.6_Atom_RelBranch
25.6_RelBranch
25.5_Atom_RelBranch
25.5_RelBranch
25.4_Atom_RelBranch
25.4_RelBranch
25.3_RelBranch
25.3_Atom_RelBranch
25.2_Atom_RelBranch
25.2_RelBranch
25.1_RelBranch
25.1_Atom_RelBranch
25.0_Atom_RelBranch
25.0_RelBranch
24.7_RelBranch
24.6_RelBranch
32.2.0_Release
32.2.0_RC1
32.1.1_Release
32.1.1_RC1
32.1.0_Release
32.1.0_RC2
32.1.0_RC1
32.1.0_beta3
32.1.0_beta2
32.1.0_beta1
32.0.1_Release
32.0.0_Release
31.4.2_Release
31.4.2_RC1
31.4.1.1_Release
31.4.1_Release
31.4.1_RC1
31.4.0_Release
31.4.0_RC2
31.4.0_RC1
31.3.1_Release
31.3.1_RC1
31.3.0.1_Release
31.3.0_Release
31.3.0_RC2
31.3.0_RC1
31.2.0.1_Release
31.2.0_Release
31.2.0_RC1
31.1.1_Release
31.1.0_Release_build2
RB_20220607_2
RB_20220607
31.1.0_Release
31.1.0_RC1
31.0.0_Release
RB_20220510
31.0.0_RC2
RC_20220507
31.0.0_RC1
29.4.6_Release
RB_29.4.6
29.4.6_RC1
29.4.5.1_Release-UXP
RC_20220409
29.4.5_Release-UXP
29.4.4_Release-UXP
29.4.3_Release-UXP
29.4.2.1_Release-UXP
29.4.2_Release-UXP
29.4.1_Release-UXP
RB_29.4.5-UXP
RB_29.4.5.1-UXP
RELBASE_20220127-UXP
RELBASE_20220118-UXP
RELBASE_20211214-UXP
RELBASE_20211110-UXP
RELBASE_20211109-UXP
RELBASE_20210914-UXP
29.4.5.1_Release
29.4.5_Release
30.0.1_Release
30.0.0_Release
30.0.0_RC4
30.0.0_RC3
30.0.0_RC2
30.0.0_RC1
29.4.4_Release
29.4.4_RC1
29.4.3_Release
29.4.3_RC1
29.4.2.1_Release
29.4.2_Release
29.4.2_RC1
29.4.1_Release
RELBASE_20210823
29.4.0.2_Release
29.4.0.1_Release
29.4.0_Release
RELBASE_20210817
29.4.0_RC2
RC_20210815
29.4.0_RC1
RC_20210813
29.3.0_Release
RELBASE_20210719
RC_20210715
RELBASE_20210608
29.2.1_Release
29.2.1_RC1
RC_20210604
29.2.0_Release
RELBASE_20210427
29.2.0_RC2
29.2.0_RC1
RC_20210421
29.1.1_Release
RELBASE_20210330
29.1.1_RC1
RC_20210326
29.1.0_Release
RELBASE_20210302
29.1.0_RC2
RC_20210226
29.1.0_RC1
RC_20210225
RELBASE_20210205
29.0.1_Release
RELBASE_20210202
29.0.0_Release
RC_20210130
29.0.0_RC2
RC_20210128
29.0.0_RC1
RELBASE_20201218
28.17.0_RC2
RC_20201216
28.17.0_RC1
RC_20201215
RELBASE_20201124
28.16.0_Release
RELBASE_20201120
28.16.0_RC1
RC_20201120
28.15.0_Release
RELBASE_20201024
28.15.0_RC1
RC_20201024
RELBASE_20201001
28.14.2_Release
RELBASE_20200930
28.14.1_Release
RELBASE_20200929
28.14.0_Release
28.14.0_RC2
28.14.0_RC1
RC_20200924
RELBASE_20200901
28.13.0_Release
RELBASE_20200831
28.12.0_Release
RELBASE_20200730
28.11.0_Release
RELBASE_20200712
RELBASE_20200711
28.10.0_Release
RELBASE_20200603
28.9.3_Release
RELBASE_20200506
28.9.2_Release
RELBASE_20200427
RELBASE_20200426
28.9.1_Release
RELBASE_20200408
RELBASE_20200324
28.9.0.2_Release
28.9.0.1_Release
28.9.0_Release
PM28.8.4_Release
v2020.02.18
PM28.8.3_Release
v2020.02.06
PM28.8.2.1_Release
PM28.8.2_Release
v2020.01.12
PM28.8.1_Release
PM28.8.0_Release
v2019.10.31
PM28.7.2_Release
v2019.09.12
PM28.7.1_Release
v2019.09.03
PM28.7.0_Release
PM28.6.1_Release
PM28.6.0.1_Release
PM28.6.0_Release
v2019.06.08
PM28.5.2_Release
PM28.5.1_Release
PM28.5.0_Release
PM28.4.1_Release
v2019.03.27
v2019.03.08
PM28.4.0_Release
v2019.02.11
PM28.3.1_Release
PM28.3.0_Release
v2018.12.18
PM28.2.2_Release
PM28.2.1_Release
PM28.2.0_Release
v2018.11.07
v2018.11.04
v2018.09.27
PM28.1.0_Release
v2018.09.05
PM28.0.1_Release
PM28.0.0.1_Release
PM28.0.0_Release
PM28.0.0_Build1
PM28.0.0b5_Unstable
PM28.0.0b4_Unstable
v2018.07.18
27.9.4_Release
PM28.0.0b3_Unstable
PM28.0.0b2_Unstable
PM28.0.0b1_Unstable
27.9.3_Release
PM28.0.0a4_Unstable
NSS_3.35_TEST
PM28.0.0a3_Unstable
v2018.06.01
PM28.0.0a2_Unstable
27.9.2_Release
27.9.1_Release
27.9.0_Release
27.8.3_Release
27.8.2_Release
27.8.1_Release
27.8.0_Release
Checkpoint_1
FullFunction_CP1
FF_Checkpoint_1
27.7.2_Release
27.7.1_Release
27.7.0_Release
27.6.2_Release
27.6.1_Release
27.6.0_Release
27.6.0-RC1
27.5.1_Release
27.5.0_Release
27.4.2_Release
27.4.1_Release
27.4.0_Release
27.3.0_Release
27.2.1_Release
27.2.0_Release
27.1.2_Release
27.1.1_Release
27.1.0b2
27.0.3_Release
27.0.2_Release
27.0.1_Release
27.0.0_Release
27.0.0b3r2
27.0.0b3
27.0.0b2
27.0.0b1
26.5.0_Release_Atom
26.5.0_Release
26.4.1_Release
26.4.1_Release_Atom
26.4.0.1_Release_Linux
26.4.0.1_Release_Atom_Linux
25.9.5_Release_Android
26.4.0_Release_Atom
26.4.0_Release
26.3.3_Release_Atom
26.3.3_Release
26.3.2_Release_Atom
26.3.2_Release
26.3.1_Release_Atom
26.3.1_Release
25.9.3_Release_Android
26.3.0_Release_Atom
26.3.0_Release
25.9.2_Release_Android
26.2.2_Release_Atom
26.2.2_Release
26.2.2_RC1
25.9.1_Release_Android
26.2.1_Release_Atom
26.2.1_Release
26.2.0_Release_Atom
26.2.0_Release
26.2.0_RC2
26.2.0_RC3
26.2.0_RC1
25.9_Release_Android
26.1.1_Release_Atom
26.1.1_Release
26.1.0_Release_Atom
26.1.0_Release
26.1.0b1
26.0.3_Release_Atom
26.0.3_Release
26.0.2_Release_Atom
26.0.2_Release
26.0.1_Release
26.0.1_Release_Atom
26.0.0_Release_Atom
26.0.0_Release
25.8.1_Release_Android
25.8.1_Release_Atom
25.8.1_Release
25.8.0_Release_Android
25.8.0_Release_Atom
25.8.0_Release
25.8.0_beta1
Goanna-publicbeta-3
Goanna-publicbeta-2
25.7.3.1_Release_Android
25.7.3_Release_Android
25.7.3_Release
25.7.3_Release_Atom
25.7.2_Release_Android
25.7.2_Release_Atom
25.7.2_Release
25.7.1_Release_Android
25.7.1_Release_Atom
25.7.1_Release
25.7.0_Release_Atom
25.7.0_Release
Goanna-publicbeta-1
25.6.0_Release_Atom
25.6.0_Release
25.6.0_beta2
25.6.0_beta1
25.5.0_Release_Atom
PM4XP64_25.5.0_RELEASE
PM4XP32_25.5.0_RELEASE
25.5.0_Release
25.5.0_beta1
PM4XP32_25.4.1_RELEASE
PM4XP64_25.4.1_RELEASE
PM4XP64_25.4.0_RELEASE
PM4XP32_25.4.0_RELEASE
25.4.1_Release_Atom
25.4.1_Release
PM4XP32_25.3.2_RELEASE
25.4.0_Release_Atom
25.4.0_Release
25.4.0_beta3
25.3.2_Release_Atom
25.3.2_Release
25.4.0_beta2
PM4XP64_25.3.1_RELEASE
PM4XP32_25.3.1_RELEASE
25.3.1_Release_Atom
25.3.1_Release
PM4XP32_25.3.0_RELEASE
PM4XP64_25.3.0_RELEASE
25.3.0_Release
25.3.0_Release_Atom
25.3.0_beta4
25.3.0_beta3
25.1.1_Release
25.3.0_beta2
PM4XP64_25.2.1_RELEASE
PM4XP32_25.2.1_RELEASE
25.3.0_beta1
25.2.1_Release_Atom
25.2.1_Release
SUMOZI_25.2.0_MERGE
PM4XP64_25.2.0_RELEASE
PM4XP32_25.2.0_RELEASE
25.2.0_Release_Atom
25.2.0_Release
25.2.0_RC2
25.2.0_beta3
25.2.0_beta2
25.2.0_beta1
25.1.1_Release-Android
25.0_Release
PM4XP32_25.1.0_RELEASE
PM4XP64_25.1.0_RELEASE
SUMOZI_25.1.0_MERGE
25.1.0_Release_Atom
25.1.0_Release
25.1.0_beta3
25.1.0_beta2
SUMOZI_25.0.2_MERGE
SUMOZI_25.0.1_MERGE
SUMOZI_25.0.0_MERGE
PM4XP64_25.0.2_RELEASE
PM4XP64_25.0.1_RELEASE
PM4XP32_25.0.2_RELEASE
PM4XP32_25.0.1_RELEASE
25.0.2_Release_Atom
25.0.2_Release
25.0.1_Release
25.0.1_Release_Atom
PM4XP32_25.0.0_RELEASE
PM4XP64_25.0.0_RELEASE
25.0.0_Release_Atom
PM4XP64_25.0.0_PRERELEASE
PM4XP32_25.0.0_PRERELEASE
25.0.0_Release
25.0.0_beta3
PM4XP64_24.7.2_RELEASE
SUMOZI_24.7.2_RELEASE
24.7.2_Release
24.7.1_Release
25.0.0_beta2
25.0.0_beta1
Milestone_25
PM4XP64_24.7.1_RELEASE
SUMOZI_24.7.1_RELEASE
SUMOZI_24.7.0_RELEASE
PM4XP64_24.7.0_RELEASE
24.7.0_Release_Android
24.7.0_Release
24.7.0_Release_build1
24.7.0_RC1
24.7.0_beta4
GUID_working_base
24.7.0_beta3
24.7.0_beta2
24.6.2-r2_Release
24.6.2_Release
24.6.1_Release
24.6.0_Release
24.6.0_RC_Build1
24.6.0_beta5
24.5.1_beta4
27.1.0_Release
28.17.0_Release
Labels
Clear labels
Good issue for contributors new to the project
Bookmarks/History
Site-Specific User Agent Overrides
Tab handling and switching
Apply labels
Assigned
Backed Out
Bounty
Bounty Paid
Browser-Parity
Bug
Build Bustage
Build System
Code Cleanup
Crash
Critical
Devtools
Documentation
Duplicate
Enhancement
Extensions
Fixed
Good first issue
Good issue for contributors new to the project
Help Wanted
High Risk Patch
Images
Incomplete
Invalid
Leave Open
Legal
Locale
Media
More Info Needed
Mozregression Wanted
On Hold
OS: Linux
OS: Mac OS X
OS: Other
OS: Windows
Performance
Places
Bookmarks/History
Plugins
Privacy
Question
Redirected to forum
Regression
Release Engineering
Security
SSUAO
Site-Specific User Agent Overrides
String changes
Sync
Tabbed browsing
Tab handling and switching
Theme changes
Theme/UI
Unconfirmed
Uplift Wanted
Verification Needed
Verified
Wontfix
Works For Me
No Label
Assigned
Backed Out
Bounty
Bounty Paid
Browser-Parity
Bug
Build Bustage
Build System
Code Cleanup
Crash
Critical
Devtools
Documentation
Duplicate
Enhancement
Extensions
Fixed
Good first issue
Help Wanted
High Risk Patch
Images
Incomplete
Invalid
Leave Open
Legal
Locale
Media
More Info Needed
Mozregression Wanted
On Hold
OS: Linux
OS: Mac OS X
OS: Other
OS: Windows
Performance
Places
Plugins
Privacy
Question
Redirected to forum
Regression
Release Engineering
Security
SSUAO
String changes
Sync
Tabbed browsing
Theme changes
Theme/UI
Unconfirmed
Uplift Wanted
Verification Needed
Verified
Wontfix
Works For Me
Milestone
Set milestone
Clear milestone
No items
No Milestone
Assignees
Assign users
Clear assignees
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.
No due date set.
Dependencies
No dependencies set.
Reference: MoonchildProductions/Pale-Moon#486
Reference in New Issue
There is no content yet.
Delete Branch '%!s(<nil>)'
Deleting a branch is permanent. It CANNOT be undone. Continue?
No
Yes
On Ubuntu, attempt to upgrade palemoon produces error message
W: GPG error: http://download.opensuse.org Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY D85722140244C327
The instructions on https://software.opensuse.org/download.html?project=home%3Astevenpusser&package=palemoon recommends downloading key from INSECURE (http) url and adding it.
That's similar level of security as posting your root password on facebook.
You should put your public key on some location it can be obtained from SECURELY and change the links on that page. Alternatively, put the key directly INTO that page.
I've sent Steve a message asking him about this.
FTR: Public keys are public. Please read up on how PKI works before making assumptions about security levels of public keys posted.
Steve should probably just upload his public key to a key server. If desired, he should ask for counter signatures to his key pair.
wolfbeast: Of course public keys are public. I meant that person who will download public key from insecure URL and add it is doing something similarly safe as posting root password on facebook (or github - not sure about facebook, but people actually posted various keys and passwords on github). There is no way to verify that the public key they downloaded is actually from Steve - it could've been changed in transit.
Yes ... uploading the key to key server should also work.
@hkmaly a root password is private, not public - please don't compare the two because that's all backwards 😄 -- of course posting a private key or phrase anywhere public is a bad idea. Not so for public keys though. There is also no reason for anyone to alter public keys in transit because it will change the cryptographic ID/fingerprint of the key to begin with and the resulting key won't be having any trust level.
Also, downloading someone's public key, valid or not, won't be compromising the downloader's security in any way -- once again, please take some time to understand how asymmetrical cryptographic signing through PKI works.
Ultimately it boils down to this: Trust that the key actually belongs to Steve can only be asserted by having other people sign that key with their cryptographic signature after verifying it belongs to Steve; that is the way PKI trust works. This is why I said to ask for counter signatures on his key pair to establish trust of identity.
I've uploaded the public key to the public key server pool. It should propagate to other public servers shortly.
@wolfbeast You might want to take some time to understand how cryptographic signing of packages work. Short version: Installation of package is done with root privileges. By installing unknown package, you are giving author of that package root access to your machine. That's why all distributions nowadays sign the packages, so noone (except the authors of distributions) can put some malware in them. But if the package is signed by unknown key, it won't be more secure - someone can switch that package IN TRANSIT or in repository. If it's signed by key which is SUPPOSED to belong to Steve, but the key itself is not downloaded in secure way, both package and key can be replaced.
While having the key signed by someone's else key is preferred method and the way PKI trust works, there are other ways how to raise trust in the key - of course, cryptographically. For example, if the key is on HTTPS server, it's equivalent to the server key signing the fact the key is really being downloaded from that server and wasn't replaced in transit. Which, while not nearly as good as having the key signed by someONE's else key, is considerably better than not having signed it at all.
(Hmmmm ... true, replaced key wouldn't have the fingerprint D85722140244C327 ... but, so far noone confirmed that fingerprint is correct. Only thing the instruction page says is: get the key which is in the file next to the package so anyone getting on that server OR anyone who can alter your traffic to that server can replace both at once easily. That's as if the file wouldn't be signed at all.)
PS: Yes, I realize that I didn't explain myself clearly on first try. I assure you my knowledge about asymmetric cryptography is better than how it looks from the first post.
I'm well-aware of how cryptographic signing of packages works.
If the package and key are replaced in the repo/on the server, meaning a compromised server account of Steve, then https won't help you. This would also be immediately noticeable to anyone observing the repo/server.
In-transit replacement of both package and key is a lot more involved than you might think, and indeed the ID would be different. Once I get a hold of Steve I'm sure I'm able to verify ownership and sign his key.
I've not received any response from Steve. You'll just have to verify the key yourself with him, and if done, sign and send to server to help the trust model of that key.
Closing.
FTR: I got a response and apparently this key is generated by the distribution platform. Its trust will go as far as the trust in the package generator. I'm not inclined to sign these kinds of keys and I don't recommend anyone else does this either because the private keys will not be in the hands of the package authors.
Sooo ... did you (or Steve) though about switching to more secure distribution platform?
This really looks as "the package is signed with key which is as trustworthy as if it wouldn't be signed at all" situation.
Take it up with Steve. He's the one responsible for the contributed build.