LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-11-2008, 07:53 PM   #16
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Original Poster
Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380

Quote:
Originally Posted by Takla View Post
I think the original article offered a range of solutions, the crucial one in this case being time expiry on signed metadata which at least reduces the window for attack.
Thanks for pointing that out, I just noticed that under the "in the future" section. Yeah, that sounds pretty similar to what I had in mind. Except I had thought about putting creation dates on the metadata, not expiration dates.

Quote:
The best solution would seem to be to only update direct from the original distro repositories using https but that's likely to remain an option for commercial distros only. Perhaps package manager clients should always refer the signed metadata to the original distro repository via https to compare timestamps before accepting the mirror's version as valid? So not only is the metadata known to be good and within its expiry limit but is also proven to be the latest available (there may be times when a patch is pushed through in quick time). This might be a reasonable alternative to using https for the entire transaction which would be cost prohibitive for the mirrors.
Yeah, having package managers download signed metadata via HTTPS directly from their distributor before any upgrade would do the trick indeed. That said, I personally don't believe HTTPS (or any other sort of secure communication) or direct connection requirements should play a part in the solution here. I'm not exactly sure why I think that way, though.

Last edited by win32sux; 07-11-2008 at 07:55 PM.
 
Old 07-11-2008, 08:12 PM   #17
Takla
Member
 
Registered: Aug 2006
Distribution: Debian
Posts: 188

Rep: Reputation: 34
Direct connection for the whole transaction would place such a huge burden on the distros that any non commercial distro probably can't do it anyway, which is why I was thinking of just verifying the signed metadata and obtaining security updates this way and relying on the mirrors for the regular bandwidth hungry part.

The discussion on slashdot is quite entertaining/informative. There are all the usual comments from people who only read the headline but the the original article's authors are contributing their comments too. One thing I noticed is how many people state that because Debian does directly host their security repos that Debian isn't vulnerable....which equates to believing that only packages audited by Debian security (i.e excluding non-free and contrib and 3rd party repos) would ever be identified as vulnerable and updated. Brave thinking!
 
Old 07-12-2008, 04:20 PM   #18
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Original Poster
Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
What to do about the mirrors knowing your IP (and that you are in need of a security patch)? Maybe package managers could use some kinda Tor-like network so that mirrors never know your IP when you download from them. Actually, now that I think about it, there's nothing stopping anyone from making their package manager go through Tor to contact mirrors.

Last edited by win32sux; 07-12-2008 at 04:22 PM.
 
Old 07-12-2008, 06:04 PM   #19
Takla
Member
 
Registered: Aug 2006
Distribution: Debian
Posts: 188

Rep: Reputation: 34
Quote:
Originally Posted by win32sux View Post
What to do about the mirrors knowing your IP (and that you are in need of a security patch)? Maybe package managers could use some kinda Tor-like network so that mirrors never know your IP when you download from them. Actually, now that I think about it, there's nothing stopping anyone from making their package manager go through Tor to contact mirrors.
I've had to do that in the past (guy who controlled local network was a prize idiot, lots of inappropriate filtering by keywords which blocked certain packages and lists) and I found it's fairly impractical to use tor due to low speed and timeouts, though it's not impossible.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
package managers? briced Linux - Distributions 3 05-09-2008 04:29 PM
Problem with all package managers darkapolloslx Debian 7 08-26-2007 04:41 PM
how do i use package managers and which one? FireRaven Linux - Newbie 1 04-21-2007 09:49 AM
considering package managers peok Linux From Scratch 4 07-27-2006 05:42 AM
Linux Package Managers a4r0 Linux - Newbie 1 08-17-2004 04:04 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:46 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration