Announcement
Collapse
No announcement yet.
Debian 9.7 Released To Address APT Security Issue
Collapse
X
-
Originally posted by JanW View Post
Please correct me if I'm wrong, but I think this would be hard or impossible to achieve if all those machines used https?
If that admin does have access to the client machines, then they can install fake certificates on all the client machines and use special https proxying software on the network to intercept the traffic, decrypt it satisfy proxied requests and then re-encrypt it using the real certificates.
Leave a comment:
-
Originally posted by sandy8925 View Post
HTTPS penalty? Are you f**king kidding me? Maybe decades ago, there was some huge penalty, now my smart watch can do HTTPS requests. There's no sane reason to continue sticking to HTTP, other than FUD.
Please correct me if I'm wrong, but I think this would be hard or impossible to achieve if all those machines used https?Last edited by JanW; 29 January 2019, 05:42 AM.
Leave a comment:
-
Guest repliedOriginally posted by Mark Rose View Post
TLS is problematic when using a proxy to cache package downloads.
Leave a comment:
-
Guest repliedOriginally posted by UlisesH View Post
My understanding is that APT allows to download from HTTP, but that's all right cause they check the signature of the packages. This avoids the penalty associated with HTTPS.
Leave a comment:
-
Originally posted by linner View PostEdit:
Never mind. I found the original source of the bug. I understand how it works now. Wow... that's nasty. I wonder how long this has been used to hack machines running updates over proxies (eg. things like Tor).
https://justi.cz/security/2019/01/22/apt-rce.html
apt will execute this guy's malicious .deb without first checking it is properly signed.
I think the "http vs https" debate in this case is secondary to the more obvious problem. That being: after the data has been returned by the http module of apt, that data should not be processed (whether's it's a deb or a package list) until apt has confirmed that it has valid gpg signatures. You should obviously assume the http data is compromised and not trustworthy.
If this vulnerability was introduced deliberately or discovered by black hats, just imagine the damage that has been done using it.
Debian needs a massive audit. I have seriously lost faith in it after this.
I hope that some large companies using Debian or Ubuntu are right-now planning a proper audit.
Just think about it: imagine you were the person working on this apt code or writing on it. If it was me I would put a huge amount of focus on correct sig verification before my code processed any of this untrustworthy data. I'd be staring at my code for ages and writing a ton of tests for it to ensure this issue didn't happen. I'd have big and clear comments stating the security sensitive nature of this part of the code.
- Likes 2
Leave a comment:
-
Originally posted by dungeon View Post
Run:
Code:apt policy apt
. And see if you have point one installed - this 1.8.0~alpha3.1 ? DSA-4371-1 or CVE-2019-3462 same thing:
Run:
Code:apt changelog apt
Same like you can see on the web
https://packages.debian.org/buster/apt
Leave a comment:
-
Originally posted by carewolf View Post
Hmm, I just don't see it in the changelog or see any security updates for testing.
Code:apt policy apt
. And see if you have point one installed - this 1.8.0~alpha3.1 ? DSA-4371-1 or CVE-2019-3462 same thing:
Run:
Code:apt changelog apt
apt (1.8.0~alpha3.1) unstable; urgency=emergency * SECURITY UPDATE: content injection in http method (CVE-2019-3462) (LP: #1812353) -- Julian Andres Klode <[email protected]> Tue, 22 Jan 2019 19:52:38 +0100
Last edited by dungeon; 24 January 2019, 09:53 AM.
- Likes 1
Leave a comment:
-
Originally posted by dungeon View Post
Affected were any currently supported Debian 7, 8, 9 and 10. So users of stable, testing, unstable, lts, elts... they all recieved update for this.
It is just that current release take a note (and here updated installer too) as that is most in use, so hot spotOn existing installations Debian 9 users get this update week ago really, so here news is just updated installer too
Leave a comment:
Leave a comment: