Hi
user
Admin Login:
Username:
Password:
Name:
Rough times? TUF shines - A framework for secure software updates
--client
debian
--show
debconf17
--room buzz 12453 --force
Next: 1 Make use of Debian to flight with censorship -- alternative way other than tor
show more...
Marks
Author(s):
Lukas Puehringer
Location
Buzz
Date
aug Thu 10
Days Raw Files
Start
12:00
First Raw Start
error-in-template
Duration
00:20:00
Offset
None
End
12:20
Last Raw End
Chapters
Total cuts_time
None min.
https://debconf17.debconf.org/talks/153/
raw-playlist
raw-mp4-playlist
encoded-files-playlist
mp4
svg
png
assets
release.pdf
Rough_times_TUF_shines_A_framework_for_secure_software_updates.json
logs
Admin:
episode
episode list
cut list
raw files day
marks day
marks day
image_files
State:
---------
borked
edit
encode
push to queue
post
richard
review 1
email
review 2
make public
tweet
to-miror
conf
done
Locked:
clear this to unlock
Locked by:
user/process that locked.
Start:
initially scheduled time from master, adjusted to match reality
Duration:
length in hh:mm:ss
Name:
Video Title (shows in video search results)
Emails:
email(s) of the presenter(s)
Released:
Unknown
Yes
No
has someone authorised pubication
Normalise:
Channelcopy:
m=mono, 01=copy left to right, 10=right to left, 00=ignore.
Thumbnail:
filename.png
Description:
An operating system's utility is largely defined by the software it can run. Such software is commonly installed and updated using package managers, library managers or application updaters that communicate with remote repositories or mirrors. As such, software installation and updates are strongly susceptible to attacks. Whether it is smuggling in backdoors, refusing to update important features and security patches, or crashing the updating client, the attack scenarios are widely diverse, but all can be costly. As a consequence many existing software update systems offer security mechanisms that seek to prevent such scenarios. Two important concepts to provide authentication and software integrity are transport layer security and cryptographically signed files. This talk reveals the limitations of the above security mechanisms, and presents an alternative. TUF is an update framework that uses multiple levels of delegation, key thresholds, and both implicit and explicit trust revocation, to not only shield users against a variety of attacks, but also make update systems especially resilient against key compromises. TUF is the first software update infrastructure that is resilient to compromises of both the repository and signing keys. It has been standardized by several groups, including Python, and is used in production by many communities, including LEAP, AppContainer, Flynn, Docker, and several automotive vendors. Some mechanisms and concepts from TUF have already been integrated into apt.
markdown
Comment:
production notes
Rf filename:
root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv
Sequence:
get this:
check and save to add this
Veyepar
Video Eyeball Processor and Review