TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Why aren't distro updates delivered https?

3 pointsby galeforcewindsalmost 7 years ago
Why don&#x27;t CentOS&#x2F;Fedora&#x2F;Ubuntu deliver all package updates over https, and encourage third-party package providers to do the same?<p>I understand SSL&#x2F;TLS reduces the risk of data tampering and reduces the risk of snooping what data is downloaded.<p>Though risk data tampering may also be reduced through the validation of cryptographically signed packages as many distros do, it would seem there remains a residual risk of exposing to the network which updates a system has downloaded. Is there reason this isn&#x27;t of concern?

3 comments

mattdmalmost 7 years ago
Note that Fedora distributes metalinks to mirrorlists via https, and the main mirror at <a href="https:&#x2F;&#x2F;dl.fedoraproject.org&#x2F;pub&#x2F;" rel="nofollow">https:&#x2F;&#x2F;dl.fedoraproject.org&#x2F;pub&#x2F;</a> also uses https. We don&#x27;t mandate that for our (volunteer!) mirror network, but many mirrors _are_ https. (See <a href="https:&#x2F;&#x2F;admin.fedoraproject.org&#x2F;mirrormanager&#x2F;mirrors&#x2F;Fedora&#x2F;28&#x2F;x86_64" rel="nofollow">https:&#x2F;&#x2F;admin.fedoraproject.org&#x2F;mirrormanager&#x2F;mirrors&#x2F;Fedora...</a> for the current list.)
gargravarralmost 7 years ago
Large organisations, and small, mine included, will generally host an internal mirror of packages. Download the entire archive once a day, serve out to all computers as necessary, making use of the higher bandwidth on the LAN.<p>As you mention, package checksums are signed using GPG to detect tampering. HTTPS adds very little benefit for such a scenario, and by sticking to plaintext, you can slightly increase the throughput since the server does not need to encrypt all the data it sends out. You also then need to coordinate SSL updates and manage server key security to machines that handle extremely high amounts of traffic continuously. Owing to the above, since many companies and volunteers around the world run mirrors and the Linux community is very open to running such mirrors, it&#x27;s impossible to enforce SSL across the board.<p>Even if an attacker were to monitor the download and take note of the package installation, it would tell them very little. Provided the download is not tampered with, the chances are that it is a security update that will improve the system&#x27;s security.<p>Many third-party APT sources do indeed use HTTPS (Microsoft, Docker and Yarn come to mind). Due to GPG package verification, this adds very little additional benefit, especially since the data being transferred is public anyway.<p>Edit: I would also add, some places do not run full mirrors but instead run caching proxy servers, which would not work with HTTPS (without doing some very messy and controversial interception). While this isn&#x27;t totally what APT was designed for, it&#x27;s generally the Linux philosophy to make updates and new software widely available as easily as possible.
elmerfudalmost 7 years ago
I think you&#x27;ve mentioned the primary reasons distributors don&#x27;t consider it a concern. If snooping the the package lists to determine the update list is considered a risk &#x2F; attack vector, then this is mitigated by running your own mirror with https. Any environment that&#x27;s at the level where this is one of their security concerns, I would argue is at the point they should have their own mirror, for not only this reason but for the many other benefits it provides.