TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Attacks against GPG signed APT repositories

12 点作者 jcapote大约 7 年前

4 条评论

whacker大约 7 年前
This is such a frustrating clickbait headline!<p>Most of the &#x27;attack&#x27; s are:<p>1. Plain old bugs in apt. 2. Involve disabling the very security features (GPG and checksum verification) designed to prevent that attack!
评论 #16512199 未加载
评论 #16434355 未加载
parliament32大约 7 年前
The main recommendation is &quot;always serve your apt repo over TLS&quot;, however, apt doesn&#x27;t use TLS by design: <a href="https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;</a>
评论 #16512190 未加载
jwilk大约 7 年前
--force-yes is bad, but for reasons that have nothing to do with replay attacks.<p>This option effectively disables package authentication. This is because it forces &quot;yes&quot; answer to <i>all</i> questions, including the question about installing unauthenticated packages.
jwilk大约 7 年前
For a moment I thought there&#x27;s a new research paper about attacks on APT. Nope. The paper the article links to is from 2008.
评论 #16512187 未加载