TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

An exposed apt signing key and how to improve apt security

7 pointsby mritzmannover 3 years ago

3 comments

gurroneover 3 years ago
Also an interesting option is using deb822 sources.list format and inline the key <a href="https:&#x2F;&#x2F;lists.debian.org&#x2F;debian-devel&#x2F;2021&#x2F;11&#x2F;msg00026.html" rel="nofollow">https:&#x2F;&#x2F;lists.debian.org&#x2F;debian-devel&#x2F;2021&#x2F;11&#x2F;msg00026.html</a><p>Still a bit ugly depending on the point of view you take but a 3rd party vendor can just tell the user to download this file and store it in &#x2F;etc&#x2F;apt&#x2F;sources.list.d&#x2F; which should make that whole thing a bit more frictionless.
nyuszika7hover 3 years ago
See, I specifically remember Debian maintaners arguing that they &quot;don&#x27;t need HTTPS&quot; on the default repos because it&#x27;s signed anyway. Now it has backfired on them. (Of course, the better solution is not blindly trusting every GPG key for every source. But if all of the users&#x27; sources had HTTPS, that would have mitigated the issue.)
yoursunnyover 3 years ago
I run a small apt repository without signing, delivered over HTTPS only. Then I tell users to put `trusted=yes` in the source line. There&#x27;s no APT signing key, no risk of compromise, and no need to backup.