On Thu, 2019-01-10 at 14:34 +0100, Michael Prokop wrote:
> * Christoph Anton Mitterer [Tue Jan 08, 2019 at 03:09:16PM +0100]:
> > Maybe one could put it (non-executable) into /u/s/d/…/examples?
> 
> I'd appreciate this, if providing it within $PATH isn't considered
> an option within Debian.

Well it's not upon me to decide it, but to the maintainer.

I've just hat a quick glance at current upstream:
https://svn.code.sf.net/p/smartmontools/code/trunk/smartmontools/update-smart-drivedb.in

It seems it now contains some code verification, both X.509 CA based
and/or OpenPGP based.
I think the X.509 CA / TLS based one can be just tossed (because X.509
PKI is inherently flawed and insecure - just take the ~150 CAs Mozilla
ships, many of them already completely untrustworthy, with even more
sub-CAs (that are even more untrustworthy).

OpenPGP would be in principle ok.
However, I haven't really checked the implementation of it (i.e. how
the code downloading, verification is done... on a first glance, I'd
say it allows at least for replay attacks.
Plus it automatically imports the shipped public key into the keyring
of the executing user… which is IMO also unacceptable.



Generally I think it's good that the tool is gone,… updating code
should *always* be the task of the respective package management
system, cause otherwise it's not just easy that code-downloader-
programs do it wrong (e.g. allowing for replay attacks, etc. pp. [0])
but it also allows for certain types of attacks (e.g. code distributed
by the package management system guarantees more or less that all users
would need to get a hacked version,... while if it's distributed by a
(possibly hacked?) upstream, single users could be targeted
selectively, making it likely much harder to notice an attack).


Having code downloaded/updated by downloader-programs also means that
this basically circumvents Debian security support.
People will only get updates if they invoke the necessary update-*
program... and things like e.g. Icinga checks (check_apt), won't see
that any action needs to be taken.


I think it security-wise it would be best not to ship it at all, or at
least (perhaps even non-executable) in the examples dir.
If there is such a big demand in having that extremely up-to-date by
many people it would be better if they could perhaps help somehow to
keep the package better up-to-date. :-)


Cheers,
Chris.

[0] Some years ago there were still many of such downloader packages in
Debian which did a very bad job in terms of security.

Reply via email to