open source
Security of the updates automation
Automation is one key factor that lets the small F-Droid team provide apps
to millions. The @checkupdates-bot
is a new reworking of an old piece of automation in F-Droid:
checkupdates. This goes through all of the existing apps, checks if they
are set up for automatic updates,
and if so, runs the process to automatically generate a new build entry for
that release. That gets added to
fdroiddata, which is what the
production buildserver processes in order to build and ship apps.
Since the best security is provided by systems that follow the principal of
least
privilege, we
recently reorganized our setup and workflow around that principal so that
the @checkupdates-bot has the least privileges needed to do its job. The
checkupdates process now runs in its own isolated project, separate from
fdroiddata and any other F-Droid project on gitlab.com. It now only
pushes commits to its own dedicated
project, then makes
a merge
request
per app to fdroiddata. Both our automated CI processes and our trusted
human reviewers now handle all updates using the same process as for new
apps.
At the same time, we removed a key bit of cruft in our code:
stats/known_apks.txt. This file was the place that stored the dates when
each app was added to the collection. This file was updated on the
buildserver and maintained in fdroiddata. That information is also in
the index file, so we
switched to
fetching it from there instead. That meant we could remove the last deploy
key in use in fdroiddata. Our operations no longer require any deploy
keys in fdroiddata.
While we were at it, we added some additional checks via the merge
requests. For example, now any time an image file is added or modified, a
CI job checks
whether the image contains any EXIF metadata, which can be used as an
exploit vector. We also added some additional enforcement to make sure
changes to key files go through human review via merge requests.
Security issue as inspiration
About a month ago, @SomberNight reported a
security issue to us
in a confidential issue. We appreciate this detailed report, and also want
to highlight their diligent follow up. In specific situations, the old
setup was leaking the private deploy key which granted access to directly
push commits to fdroiddata. We immediately revoked that key, then removed
all privileges from the @fdroidci user that
was associated with that private key. We also investigated all the leads we
could follow to see if someone had used this key to insert something into
F-Droid. We searched the activity of the @fdroidci user and found no
evidence that unauthorized commits were added.
To be sure, we did some additional investigations. Since checkupdates had
been running as part of the fdroiddata project on gitlab.com, a malicious
app build recipe could have also read the CHECKUPDATES_SSH_DEPLOY_KEY
variable which contained the private key. We checked fdroiddata’s history
for signs of exfiltration and found nothing. We require that apps are built
from source code, and that source code is in a source code management system
like Git. That ensures a local copy with history is retained on our
buildserver. We searched our local copy source code and found no evidence
that any app build processes where trying to exfiltrate the checkupdates
private key.
Do you have more ideas for things to search? Please dig in and let us know
if you find anything suspicious. Working in public means everyone is free
to investigate and come to their own conclusions, and contribute to a more
secure free software ecosystem on Android.
Support my attempt to find out if you can do NFC tap-to-pay without big tech
Top articles at OpenSource.net in 2024
Jasemin Scene #180
Video by via Dailymotion Source Glumac/GlumicaSerhat TutumluerCeyda DüvenciÖzge ÖzderHale AkınlıBennu YıldırımlarBatuhan KaracakayaSongül ÖdenMelda AratCenk Ertanİlker Kurtİncilay ŞahinMetin BüktelEvrim SolmazServer MutluEce HakimDevrim ÖzderErdal BilingenFurkan Andıç Go to Source
Lập trình front end là gì? Công việc front-end developer là gì?
Video by via Dailymotion Source Hiện nay có rất nhiều bạn vẫn chưa biết lập trình front end là gì và công việc của front end developer là làm những gì. Không những vậy còn nhiều bạn trẻ nhầm lẫn giữa công việc của người lập trình web với lập trình viên front end. Tuy … Read more
“درس في الإنسانية” من سائق حافلة
Video by via Dailymotion Source “درس في الإنسانية” من سائق حافلة في مشهد حظي بإشادة واسعة.. سائق حافلة تركي يعطي درسًا في الإنسانية بمساعدته لمسنة تعاني من صعوبة في الحركة العين الإخبارية.. بوابة إخبارية عربية شاملة، تغطي أخبار العالم العربي والدولي .. تضعك دائما في قلب الحدث، لتصبح عينك على العالم برؤية مختلفة، ومحتوى متميز … Read more
Still Piano by Ray Mak
Video by via Dailymotion Source Still Piano by Ray Mak ( from @hillsongworship ) Heard this beautiful song at @gladtidingsmy last Sunday and was immediately absorbed. Hope you guys like my piano version. All Glory to God =) STILL Hide me now Under Your wingsCover meWithin Your mighty hand When the oceans riseAnd thunders roarI … Read more
Bengaluru, Delhi, Andhra-வுக்கு வரப்போகும் Metro Projects! | Oneindia Tamil
Video by via Dailymotion Source Bengaluru, Delhi, Andhra Pradesh Metro சேவையை விரிவாக்கம் செய்வதற்கு அமைச்சரவை ஒப்புதல் அளித்துள்ளது #nammametro #bengalurumetro #delhimetro Also Read தொழில்நுட்ப கோளாறு.. வானத்தில் வட்டமடித்த சென்னை விமானங்கள்.. நல்வாய்ப்பாக உயிர் தப்பிய பயணிகள் :: https://tamil.oneindia.com/news/chennai/chennai-flights-delays-due-to-severe-weather-011-662329.html?ref=DMDesc 14ஆம் தேதி உருவாகுது இன்னொரு காற்றழுத்த தாழ்வுப்பகுதி.. மழை எப்படி? டெல்டா வெதர்மேன் கணிப்பு! :: https://tamil.oneindia.com/weather/new-low-pressure-area-likely-to-bring-widespread-rain-across-tamil-nadu-from-december-16-delta-weat-662309.html?ref=DMDesc செம்பரம்பாக்கம் ஏரி நீர்மட்டம் கிடுகிடுனு ஏறுது.. 6 மணி நேரத்தில் 5 … Read more
“Dólar abaixo de R$ 6, Lula internado, Goiânia premiada: Confira os destaques da semana!”
Video by via Dailymotion Source Uma semana cheia de acontecimentos: queda do dólar, internação de Lula e Goiânia recebendo um título da ONU. Confira os detalhes! Go to Source