Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense image hashes, folly?

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 3 Posters 2.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DerelictD Offline
      Derelict LAYER 8 Netgate
      last edited by

      Isn't it kind of silly to upload MD5 and SHA256 hashes to the same mirrors hosting the images?

      If someone can insert a bad image, can't they just insert a corresponding hash file to match?

      Shouldn't there, instead, be PGP signatures?

      Or at least a PGP-signed block of text in some release notes, blog post, etc. containing the image file names and what they should hash to?

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • stephenw10S Offline
        stephenw10 Netgate Administrator
        last edited by

        The release images are signed. The MD5 hashes are really there so you can check the download was not corrupted.

        @https://doc.pfsense.org/index.php/Can_I_upgrade_my_pfSense_through_the_web_interface%3F:

        Note if you're installing an image from the snapshots server, you will receive a warning that "The digital signature on this image is invalid." This is normal, the snapshot releases are built automatically and signing them requires manual intervention so none of the snapshot releases are signed.

        Steve

        1 Reply Last reply Reply Quote 0
        • DerelictD Offline
          Derelict LAYER 8 Netgate
          last edited by

          Isn't that only true for upgrades, not new installs downloading, say, pfSense-LiveCD-2.1-RELEASE-amd64.iso.gz ??

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • K Offline
            kejianshi
            last edited by

            I have my ISOs hand delivered from PFsense HQ to ensure integrity.

            But, what scheme would you suggest for the masses?

            MyChecksum.jpg
            MyChecksum.jpg_thumb

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              Derelict suggests signed hashes. Doesn't seem unreasonable.

              Steve

              1 Reply Last reply Reply Quote 0
              • K Offline
                kejianshi
                last edited by

                Yeah - How do you implement it in a way that can't be forged?  (I'm not web guru)
                I'd assume the entire site would have to be something other than flat http?

                1 Reply Last reply Reply Quote 0
                • DerelictD Offline
                  Derelict LAYER 8 Netgate
                  last edited by

                  Electric Sheep Fencing generates a PGP key and signs all release announcements which would include hashes of the release distribution files.

                  That way there would at least be something to check.  And it could be checked even if the files were downloaded from Russian warez sites.

                  There could also be PGP signatures generated for every file alongside the existing md5 and sha256 hashes.  Either way, doesn't matter.

                  Emailed security announcements could be signed as well.

                  The public key could also be used to encrypt security vulnerability discoveries to the team if that situation should arise.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • DerelictD Offline
                    Derelict LAYER 8 Netgate
                    last edited by

                    Recent email I received.  This has value to me, maybe not to anyone else:

                    –---BEGIN PGP SIGNED MESSAGE-----
                    Hash: RIPEMD160

                    Folks,

                    This is a prior notice email to permit postmasters to preload PGP keys
                    needed for validating the next Exim release.

                    Two of the exim.org team members, Todd Lyons and Jeremy Harris, shall
                    soon start the work of cutting the Exim 4.82 release and beginning the
                    RC series.

                    We currently expect that the 4.82 Release Candidates, final Release, and
                    announcement message shall be PGP signed using Todd's key:

                    0xC4F4F94804D29EBA

                    This key is in the PGP strong set, although it does not at time of
                    writing include any signatures directly from any other @exim.org UIDs.
                    There is a trust path from my key to Todd's via a key belonging to Phil
                    Dibowitz, 0x3795E8C5A1E732BB.

                    For the record: I know Mr Dibowitz as a former colleague, he is very
                    security conscious and does not issue PGP signatures without diligent
                    checking.  He's the author of the PGP tutorial documentation available
                    at <http: phildev.net="" pgp="">and is one of the few people to whose keys
                    I assign a GnuPG trust ranking of '4'.  Thus I have a high degree of
                    confidence in this trust path.

                    You can retrieve Todd's key from any of the normal PGP keyservers; for
                    instance:

                    http://ha.pool.sks-keyservers.net:11371/pks/lookup?op=vindex&search=0xC4F4F94804D29EBA

                    (click on the keyid in the "pub" line at the top).

                    This Exim release is long overdue and I'd like to take this opportunity
                    to thank Todd and Jeremy for stepping up to make it happen.

                    Regards,

                    • -Phil Pennock
                      -----BEGIN PGP SIGNATURE-----

                    iEYEAREDAAYFAlJBKwoACgkQQDBDFTkDY38YkQCfb7gyG7BTaRhRz45pJqUqg65d
                    KCkAn321P2lmc7nQWH/9XdbszN4PsjNQ
                    =djB8
                    -----END PGP SIGNATURE-----</http:>

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • DerelictD Offline
                      Derelict LAYER 8 Netgate
                      last edited by

                      #NSA #BUMP

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.