Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- Date: Thu, 20 Sep 2012 23:26:42 +0900
- From: Curt Sampson <cjs@example.com>
- Subject: Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- References: <CA+su7OWvHruqQ8MVWKqkGNSwrnLS0GeZECk=B4P4AwWN=qR8eg@mail.gmail.com> <87627grg2i.fsf@uwakimon.sk.tsukuba.ac.jp> <20120915065609.GB9846@homeric.cynic.net> <87wqzvpci6.fsf@uwakimon.sk.tsukuba.ac.jp> <20120915152427.GA32537@homeric.cynic.net> <87txuypjck.fsf@uwakimon.sk.tsukuba.ac.jp> <20120920004427.GA6656@homeric.cynic.net> <87boh1oyd6.fsf@uwakimon.sk.tsukuba.ac.jp>
- User-agent: Mutt/1.5.21 (2010-09-15)
On 2012-09-20 18:08 +0900 (Thu), Stephen J. Turnbull wrote: > Curt Sampson writes: > > > Well, the obvious thing to do here is really just to make a tar archive > > of the source you're going to upload and sign that. > > Sure, that's the standard approach. The potential problem is that now > the trusted provider has to authenticate the archive uploaded to the > secure AMI against your signature *and* against the version you've > published for users to audit. I would think you'd have the server allow downloads of the version it's running, rather than worry about having the user get something the server already has from somewhere else. > Yeah, I thought about that. I don't see how it's a reduction in > attack surface, though. It's just a question of how reliable the > chained SHA1 is, but that's the only point of attack I can see. I wouldn't be confident that that's the only new area of attack without further analysis, and even just the question of the reliability of the chained SHA1 is not trivial. (If it were, we wouldn't be using things such as HMACs instead of straight hashes.) cjs -- Curt Sampson <cjs@example.com> +81 90 7737 2974 It is easier to write an incorrect program than understand a correct one. --Alan Perlis, Epigrams on Programming (#7)
- Follow-Ups:
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Stephen J. Turnbull
- References:
- [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Edmund Edgar
- [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Stephen J. Turnbull
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Curt Sampson
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Stephen J. Turnbull
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Curt Sampson
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Stephen J. Turnbull
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Curt Sampson
- Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- From: Stephen J. Turnbull
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- Next by Date: Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- Previous by thread: Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- Next by thread: Re: [tlug] Any way to make code running on a cloud service publicly verifiable?
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links