Software updates and TUF
The Root Key
As mentioned previously, the root key or keys must be well protected, because these are the keys you use to sign the other keys, which are then used to sign the software, update information, and so on. Because you only need to use the root keys to sign other keys, it is relatively simple to keep them on an offline system. For example, you could use a cheap netbook with WiFi/Ethernet disabled, and move keys to and from it using a USB stick. If you want even more security, you can use a hardware module to contain the key. These tend to be quite expensive, but because TUF uses GPG, you can use an OpenGPG cryptocard , which you can generally order online for less than US$ 20 and which supports 4,096-bit RSA keys.
The Targets Role
The targets role is essentially used to sign the files that are being offered for download. The targets role can be automated; for example, you can set up a server to sign uploaded files automatically. This, of course, should be done on a secured, dedicated server; you shouldn't also use it to offer the files for download, for example. However, if you use different keys for metadata signing, then a compromise of the target role key can't exactly be used to push updates. The attacker will be able to sign the files but not modify the metadata telling the client to install them.
The Delegated Targets Role
The delegated target role is optional; basically, instead of using a single role to sign files, you can delegate it. For example, you may have a main application with user-contributed plugins, and the signing of these plugins could be delegated to other target roles. This approach allows multiple organizations to participate in an update system securely. You can sign the third-party key, and they can then use it to sign their files and send them to the update system.
Buy this article as PDF
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.