LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 06-09-2005, 10:34 AM   #1
little_penguin
Member
 
Registered: Nov 2004
Location: Scotland
Distribution: Suse 10 - Running KDE
Posts: 314

Rep: Reputation: 30
Are mirrors a security risk??


Okay, Im still learning about linux so maybe I have got this a little wrong but this is what is concening me -

Problem 1
If I download a program from sourceforge, the download comes from a mirror, who is it that control these mirrors? If it isnt the developers, couldnt the packages have been tampered with?

Problem 2
I download security updates from Yast Online Update, again I can do that from a a bunch of mirrors, couldnt the same problem arise here?

Problem 3
I use Yast to point to rpm download locations like packman or the like that have a huge list of packages, this is great because it makes all the stuff easy to install, but again, isnt there a security risk with this? Couldnt all of these packages have been tampered with.

So far I have only downloaded rpms using yast from the official suse ftp site beacuse I am worried about the above risks, but it is beginning to become very restrictive and I cant get the software I need, anyone got any ideas about the abvove problems?

Maybe I am worrying about nothing with this - it would be good to know either way.

If these are real problems, isnt there a chance of linux becomming a prime target for insecurity as we all believe it is too secure for that to ever happen, maybe we have left our guard down a little too much?

I hope not as linux is great.
 
Old 06-09-2005, 11:35 AM   #2
little_penguin
Member
 
Registered: Nov 2004
Location: Scotland
Distribution: Suse 10 - Running KDE
Posts: 314

Original Poster
Rep: Reputation: 30
Anyone got any ideas on this?
 
Old 06-09-2005, 11:39 AM   #3
trickykid
LQ Guru
 
Registered: Jan 2001
Posts: 24,149

Rep: Reputation: 269Reputation: 269Reputation: 269
Quote:
Originally posted by little_penguin
Anyone got any ideas on this?
First of all, don't bump your own threads until after about 48 hours. Threads with 0 replies are automatically bumped after 16 and 24 hours.

Secondly for your question: NO, for crying out loud. Did you know the distro you most likely installed obtained 80% of its packages from mirrored sites to package for you for one big download and install..

I would trust an open source package on a mirrored site over a proprietary package any day of the week as the source code is freely available to you..

Go download your packages and stop being a freak about its security or not, its most likely more secure than anything you download from Microsoft.com as they don't give you the code your running..

Last edited by trickykid; 06-09-2005 at 11:41 AM.
 
Old 06-09-2005, 12:40 PM   #4
mattLSO
Member
 
Registered: Jun 2005
Posts: 43

Rep: Reputation: 15
I disagree with the comment by my counter part here...

Quote:
Secondly for your question: NO, for crying out loud. Did you know the distro you most likely installed obtained 80% of its packages from mirrored sites to package for you for one big download and install..

I would trust an open source package on a mirrored site over a proprietary package any day of the week as the source code is freely available to you..
Mirrors are prime targets and they have been hacked many times in the past... usually it is covered
up, not so long ago even the debian distribution sites were hacked themselves, so I guess you can never be safe, but since mirrors are run by third parties generally, at establishments like .edu's in
Russia I know who I would prefer to download files from.

http://www.zdnet.com.au/news/securit...0281310,00.htm

This is one of the benefits for an enterprise organisation of running a commercial distribution such
as Redhat, volunteer distributions could easily have unscrupulous individuals join on board.
 
Old 06-09-2005, 01:29 PM   #5
Kdr Kane
Member
 
Registered: Jan 2005
Distribution: SUSE, LFS
Posts: 357

Rep: Reputation: 30
little_penguin,

I suggest you go back to Windows or Mac. It doesn't appear you are ever going to be happy with an answer on this.

You also sound like a good customer for Matt.

Different people have different ideas about security. Do I feel good about the security of packages on mirrors? You bet I do. But, I have a really good understanding of the security and what it takes to be compromised.

If my systems did happen to become compromised, you can bet the world would still go on without me.

Don't let fear override your thinking. And don't let those that prey on your fear to control your life.
 
Old 06-09-2005, 02:17 PM   #6
KimVette
Senior Member
 
Registered: Dec 2004
Location: Lee, NH
Distribution: OpenSUSE, CentOS, RHEL
Posts: 1,794

Rep: Reputation: 46
mattLSO must work for Microsoft FUD^H^H^HMarketing department.
 
Old 06-09-2005, 03:29 PM   #7
jon_k
Member
 
Registered: Jul 2003
Location: Fort Worth, Texas
Distribution: Mepis Linux 2004
Posts: 547

Rep: Reputation: 30
Quote:
Originally posted by mattLSO

http://www.zdnet.com.au/news/securit...0281310,00.htm
[/B]
That link says their security update server was compromised, but ZDNET is a "Windoze" based reporting site anyways.

Better to read a respected security website: " Debian servers hacked, archive safe"
http://searchenterpriselinux.techtar...938279,00.html

"The alert, posted to several security and Linux mailing lists, stresses that its archive had not been hacked, sparing thousands of installations a potential security nightmare."

Seems like some editors need to go over "Patrick Gray, ZDNet Australia" journalism, lest we have another Stephen Glass from The New Republic.
 
Old 06-09-2005, 03:47 PM   #8
dosnlinux
Member
 
Registered: Mar 2005
Distribution: slackware 11, arch 2007.08
Posts: 154

Rep: Reputation: 30
If you use the checksums (md5, ect...) from the official sites, and everything equals out, then chances are the package isn't tampered with, and if it's source code it's probably not tampered with (if it is you can easily fix the tampering)
 
Old 06-09-2005, 04:48 PM   #9
Electro
LQ Guru
 
Registered: Jan 2002
Posts: 6,042

Rep: Reputation: Disabled
Mirror servers usually use rsync to mirror the main server. The utility rsync uses a checksum to verify the file is correct. Can you depend on the mirrors? Yes, you can but as dosnlinux said verify the file with md5. Adding what dosnlinux said is verify using digital signatures like ASC, GPG, or PGP.
 
Old 06-10-2005, 08:22 AM   #10
dosnlinux
Member
 
Registered: Mar 2005
Distribution: slackware 11, arch 2007.08
Posts: 154

Rep: Reputation: 30
Thanks for the tip. where can I find an ACS verifier? The only things I get in Google is actual .acs files.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security Risk computerdude Linux - Security 3 08-31-2005 02:25 PM
Gentoo security risk? mikieboy Linux - Security 1 03-08-2005 07:44 PM
Security Risk? N|k0N Linux - Security 7 10-02-2004 04:52 PM
is this a security risk? shanenin Linux - Security 8 11-02-2003 04:27 PM
security risk? Notfromkansas Linux - Security 12 04-04-2002 10:30 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 03:03 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration