[Pidgin] #14565: Link to .asc file and offer download over TLS

Pidgin trac at pidgin.im
Thu Sep 20 12:57:58 EDT 2012


#14565: Link to .asc file and offer download over TLS
-------------------------------------------------+-------------------------
 Reporter:  ioerror                              |       Owner:  rekkanoryo
     Type:  task                                 |      Status:  new
Milestone:                                       |   Component:
  Version:                                       |  unclassified
 Keywords:  security https tls pgp signature     |  Resolution:
  win32                                          |
-------------------------------------------------+-------------------------

Comment (by ioerror):

 Replying to [comment:8 datallah]:
 > Replying to [comment:5 ioerror]:
 > > Replying to [comment:4 datallah]:
 > > > SSL downloads are probably not going to happen any time soon.  The
 bandwidth requirements would be quite high, we'd lose the Sourceforge
 global mirroring, and with the GPG signatures, SSL doesn't really offer
 any security benefits.
 > > >
 > >
 > > I'm not really clear on what those bandwidth requirements are - so I'm
 curious to know  if that is actually such a big deal?
 >
 > Since the 2.10.6 was released on 2012-07-06, there have been ~615K
 downloads.
 > The vast majority (530K) of these are the Windows installer, which is
 about 10MB.
 > On the top day for downloads, ~20K downloads, which means there was
 ~200GB downloaded on that day.
 > The first month after it was released saw ~280K downloads, ~ 2.8TB.
 >

 Ok - that isn't very much at all. I can imagine that if you offer a secure
 mirror, you could get a good idea of how many people might use it.

 > This doesn't include downloads of the GTK+ Bundle.

 That is good to note.

 >
 > > I would for example be more than happy to run a secure mirror if there
 was an easy way to keep my mirror up to date. We could offer it as an
 option to people. Also, we might consider trying to use github - they
 offer HTTPS for their entire site, in theory, even for downloads. I did
 find an issue with it though, so that may or may not be a real option.
 >
 > I guess I'm wondering what real benefit SSL downloads will offer.  I
 understand the need for the ability to validate that the download hasn't
 been tampered with, but SSL can't really do that in the same way that a
 signature does.
 >

 The main benefit is that nearly no one checks signatures other than people
 who package software. Signatures are good and in some ways, they are the
 best defense when the downloading party understands them. However, most
 users in my experience and in looking at various stats on the subject,
 simple do not check them - there is no easy way to do it on two of the
 major platforms.

 So the real benefit is that the bar is raised from an attacker who can
 MITM HTTP (trivial) to an attacker who can MITM HTTPS (less than trivial
 but still possible). Practically, I think this really improves the entire
 stack of things, even one would need to check the gpg signature to
 *really* know if things were as expected.

 > Sourceforge, for all it's warts, has done a good job of providing
 redundant hosting with lots of mirrors located on several continents.  I
 feel like unless there is a compelling reason to reinvent the wheel, we
 shouldn't be doing that.
 >

 I suggest augmenting the wheel and seeing if there is demand. By making an
 option, we'll be able to see if anyone cares to use the option. As I
 stated, I'd be happy to run a secure mirror and I bet we can find some
 others - the Tor Project does mirror some related projects on
 https://archive.torproject.org/ - we might be able to do the same for
 Pidgin.

 > > > What we really should do is to update the download pages to link to
 the GPG signature files and add instructions on how to check the
 signatures of the downloads.
 > >
 > > I agree. Tor's signature checking page is here:
 > > https://www.torproject.org/docs/verifying-signatures.html
 >
 > I'll be working on this soon; more to come.
 >
 > > I almost think we need a common tool for users, available over HTTPS
 that helps them to verify signatures of all the projects who ship GnuPG
 signatures. In theory this is gpg and in practice, a user who can use gpg
 is not the norm. Thoughts?
 >
 > I guess it doesn't seem wise or appropriate to try to create and
 maintain our own tool for doing this; we have our hands full enough
 without taking on an additional challenge of something that's difficult to
 get right.
 > It also seems to me that people who don't (care enough to take the time
 to) understand what it takes to validate the download aren't going to be
 any more secure if there's a tool that that rubber-stamps a download as
 "secure".

 Oh, my suggestion is a project in itself that will help all projects who
 are in the current position. Tor has the same need - as does Pidgin -
 Windows users need a way to verify signatures and currently, it is
 basically not happening. I was suggesting a basic Windows application,
 perhaps with wget and gpg embedded that perhaps will fetch a thing,
 certainly verify it and we can make the website for it quite secure. That
 is, we could embed the website's public key in Chrome (as is done for
 Tor's https certs), enable HSTS, and create a unified tutorial for the
 process. I realize it is out of scope for Pidgin but if such a tool is
 interesting to you, I can imagine it might be worth considering...

-- 
Ticket URL: <https://developer.pidgin.im/ticket/14565#comment:10>
Pidgin <http://pidgin.im>
Pidgin


More information about the Tracker mailing list