Your message dated Fri, 14 Aug 2015 15:36:15 +0200
with message-id <20150814153533.ga31...@debian.org>
and subject line Re: Bug#665920: apt: failed secure APT checks don't give 
errors and non-zero exit statuses in all cases
has caused the Debian Bug report #665920,
regarding apt: failed secure APT checks don't give errors and non-zero exit 
statuses in all cases
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
665920: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665920
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: apt
Version: 0.8.15.10
Severity: important


Hi.

I did some non-systematic tests on secure APT (with partially shocking results).

The following is at least true, for the download action of apt (and I guess
therefore of aptitude, too), perhaps for other actions (and or option 
combinations,
in which verifications should happen, too)

It does not give an error and exit code = 0 when the verification of the 
downloaded
file fails.


The check seems however to actually take place, cause if I modify the hashsums
in e.g. ftp.de.debian.org_debian_dists_unstable_main_binary-amd64_Packages for
the base-files binary package and I do an:
$ apt-get download base-files
Get:1 Downloading base-files 6.7 [69,4 kB]
Fetched 69,4 kB in 0s (134 kB/s)

All I get is:
l
total 78k
drwxr-xr-x 2 calestyo calestyo 4,1k Mar 27 03:00 .
drwx------ 6 calestyo calestyo 4,1k Mar 27 02:41 ..
-rw-r--r-- 1 calestyo calestyo  70k Mar  4 01:17 base-files_6.7_amd64.deb.FAILED


Generally I think that all kinds of verification errors should be treated as 
(most
severe) errors (not just warnings) and that the exit status should be non-zero.
Best would be to have special exit-code, that denotes that potential security 
issues
occured.


In the above case, renaming the file to .FAILED may seem enough, but one can 
never
know how the users uses the system, and perhaps relies on failed exit statuses.
Or imagine a (though stupid) script that downloads the .deb to a temp dir and
takes the only file of that dir (regardless of the .FAILED) and e.g. installs 
it.
I mean this would be badly written code, but we really should try to protect 
even
such cases, especailly when this is easily possible.


Cheers,
Chris.



btw: Perhaps someone can explain this:
I traced the process and get the following:
stat("/var/lib/apt/lists/ftp.de.debian.org_debian_dists_unstable_Release.gpg", 
0x7fff750b4670) = -1 ENOENT (No such file or directory)
stat("/var/lib/apt/lists/_srv_local-package-archive_dists_unstable_Release.gpg",
 {st_mode=S_IFREG|0644, st_size=836, ...}) = 0

So while there is a Release.gpg for my local archive, there is none for 
Debian's.
Why and is this a security problem?



--- End Message ---
--- Begin Message ---
On Tue, Mar 27, 2012 at 03:12:07AM +0200, Christoph Anton Mitterer wrote:
> Package: apt
> Version: 0.8.15.10
> Severity: important
> 
> 
> Hi.
> 
> I did some non-systematic tests on secure APT (with partially shocking 
> results).
> 
> The following is at least true, for the download action of apt (and I guess
> therefore of aptitude, too), perhaps for other actions (and or option 
> combinations,
> in which verifications should happen, too)
> 
> It does not give an error and exit code = 0 when the verification of the 
> downloaded
> file fails.
> 
> 
It exits with 100 in sid and experimental now.

-- 
Julian Andres Klode  - Debian Developer, Ubuntu Member

See http://wiki.debian.org/JulianAndresKlode and http://jak-linux.org/.

Be friendly, do not top-post, and follow RFC 1855 "Netiquette".
    - If you don't I might ignore you.

--- End Message ---

Reply via email to