secure software distribution in an adversarial world
TRANSCRIPT
![Page 1: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/1.jpg)
Secure Software Distribution in an Adversarial World
@diogomonica
🔐💾↔👹🌎
![Page 2: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/2.jpg)
![Page 3: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/3.jpg)
![Page 4: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/4.jpg)
![Page 5: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/5.jpg)
![Page 6: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/6.jpg)
source: edharrington.tumblr.com
![Page 7: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/7.jpg)
Isn’t HTTPS enough?
![Page 8: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/8.jpg)
![Page 9: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/9.jpg)
![Page 10: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/10.jpg)
![Page 11: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/11.jpg)
What about GPG?
![Page 12: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/12.jpg)
![Page 13: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/13.jpg)
![Page 14: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/14.jpg)
![Page 15: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/15.jpg)
3 months later…
![Page 16: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/16.jpg)
![Page 17: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/17.jpg)
![Page 18: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/18.jpg)
![Page 19: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/19.jpg)
![Page 20: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/20.jpg)
![Page 21: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/21.jpg)
“A software update system is secure if it can be sure that it knows about the latest available updates in a timely manner, any files it downloads are the correct files, and no harm results from checking or downloading files.”
- The Update Framework
![Page 22: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/22.jpg)
•Freshness •Signed collections •Key Hierarchy •Transparent key rotation •Threshold signing
![Page 23: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/23.jpg)
Freshness
![Page 24: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/24.jpg)
Freshness
![Page 25: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/25.jpg)
Signed Packages Signed Collection
Signed Collections
![Page 26: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/26.jpg)
Key Hierarchy
![Page 27: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/27.jpg)
Key Hierarchy
![Page 28: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/28.jpg)
Short Expiry
Long Expiry
Less Sensitive
More Sensitive
Key Hierarchy
![Page 29: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/29.jpg)
Transparent Key Rotation
![Page 30: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/30.jpg)
Transparent Key Rotation
offline
online
![Page 31: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/31.jpg)
Transparent Key Rotation
![Page 32: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/32.jpg)
Transparent Key Rotation
![Page 33: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/33.jpg)
Threshold Signing
![Page 34: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/34.jpg)
Threshold Signing
![Page 35: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/35.jpg)
Use The Update Framework (TUF)
theupdateframework.com
![Page 36: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/36.jpg)
Notary, an opinionated implementation of TUF
github.com/docker/notary
![Page 37: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/37.jpg)
When the going gets tough, get TUF going
![Page 38: Secure Software Distribution in an Adversarial World](https://reader031.vdocuments.us/reader031/viewer/2022030303/587bfea51a28ab7c668b614f/html5/thumbnails/38.jpg)
Thank you@diogomonica