Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security] Add canary statement #8710

Open
replicadse opened this issue May 7, 2024 · 3 comments
Open

[Security] Add canary statement #8710

replicadse opened this issue May 7, 2024 · 3 comments

Comments

@replicadse
Copy link

replicadse commented May 7, 2024

Feature Request

As an operating system, talos linux is a critical part of the system if used for production workloads. As that, it is important to verify the integrity of the system (and developers). With that being said, I suggest the following changes to increase security for this amazing piece of software.

Asset checksums

I suggest that we're adding checksums to the asset downloads on the release page. This can be used to verify that a downloaded file has not tampered with in transit. This is generally a best practice when downloading critical software and prevents a range of attacks that could compromise the asset.

Canary

In order to increase trust in Talos linux, I suggest that siderolabs adds a canary statement to verify that a release does not contain a backdoor or other types of desired malware. In the many countries, law enforcement can seize property (like Talos as IP) and modify / redistribute it with backdoors. They can require you to not speak out but can't require you to take certain actions (such as signing with a PGP key etc).
Long story short, I think a critical piece of infrastructure such as an OS should provide a canary statement that no such incident took place. Wh0nix is such an example, providing a canary incl. recent headlines to prove it's recent.

@smira
Copy link
Member

smira commented May 7, 2024

Most critical release assets are reproducible, so you can build it yourself from source and compare to the released assets. This provides better protection/trust than any other measures.

The reproducible assets are:

  • kernel
  • initramfs
  • installer container
  • imager container

Every other asset can be produced from the above.

@steverfrancis
Copy link
Collaborator

There are sha256sum.txt

sha512sum.txt
published with every release - are those not the checksums you mean?

@replicadse
Copy link
Author

@steverfrancis yes correct - I must've missed these three times while looking through the list. Excellent!

@replicadse replicadse changed the title [Security] Add asset checksums and canary statement [Security] Add ~~asset checksums~~ and canary statement May 7, 2024
@replicadse replicadse changed the title [Security] Add ~~asset checksums~~ and canary statement [Security] Add canary statement May 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants