TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Attacks against GPG signed APT repositories

12 pointsby jcapoteabout 7 years ago

4 comments

whackerabout 7 years ago
This is such a frustrating clickbait headline!<p>Most of the &#x27;attack&#x27; s are:<p>1. Plain old bugs in apt. 2. Involve disabling the very security features (GPG and checksum verification) designed to prevent that attack!
评论 #16512199 未加载
评论 #16434355 未加载
parliament32about 7 years ago
The main recommendation is &quot;always serve your apt repo over TLS&quot;, however, apt doesn&#x27;t use TLS by design: <a href="https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;</a>
评论 #16512190 未加载
jwilkabout 7 years ago
--force-yes is bad, but for reasons that have nothing to do with replay attacks.<p>This option effectively disables package authentication. This is because it forces &quot;yes&quot; answer to <i>all</i> questions, including the question about installing unauthenticated packages.
jwilkabout 7 years ago
For a moment I thought there&#x27;s a new research paper about attacks on APT. Nope. The paper the article links to is from 2008.
评论 #16512187 未加载