On Tue, Jan 22, 2019 at 10:06:01PM -0500, Chris Laprise wrote:
> On 01/22/2019 09:51 PM, Marek Marczykowski-Górecki wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA256
> > 
> > On Tue, Jan 22, 2019 at 09:44:31PM -0500, Chris Laprise wrote:
> > > On 01/22/2019 08:49 PM, unman wrote:
> > > > On Tue, Jan 22, 2019 at 12:57:37PM -0500, Chris Laprise wrote:
> > > > > On 01/22/2019 12:03 PM, Marek Marczykowski-Górecki wrote:
> > > > > > -----BEGIN PGP SIGNED MESSAGE-----
> > > > > > Hash: SHA256
> > > > > > 
> > > > > > On Tue, Jan 22, 2019 at 08:03:01AM -0800, Brendan Hoar wrote:
> > > > > > > https://justi.cz/security/2019/01/22/apt-rce.html
> > > > > > > 
> > > > > > > A patch is out to cover this vulnerability, but I'm of the 
> > > > > > > opinion that it may be best to move the qubes-update-proxy worker 
> > > > > > > VMs to a disposable VM model after reading up on this one.
> > > > > > > 
> > > > > > > Granted, at first glance it appears that the use of the 
> > > > > > > qubes-update-proxy certainly helps, but using disposable VMs 
> > > > > > > might provide an extra layer of protection.
> > > > > > 
> > > > > > Updates proxy unfortunately does not help with this issue, but also 
> > > > > > is
> > > > > > not affected by it (at least not directly). It is only a http 
> > > > > > proxy, which
> > > > > > does not interpret content it receive, only pass it down to the VM 
> > > > > > that
> > > > > > requested it. Specifically, if remote server would send malicious
> > > > > > Location: header, it will be forwarded back to apt. While in theory 
> > > > > > that
> > > > > > proxy could perform some extra filtering on the response, it isn't 
> > > > > > used
> > > > > > for that right now. I don't think tinyproxy supports anything like 
> > > > > > this
> > > > > > (but we could change it to a different http proxy implementation).
> > > > > 
> > > > > The proxy appears to be 'affected' in the sense that Debian's 
> > > > > temporary
> > > > > update instructions from their security bulletin do not work in the 
> > > > > Qubes
> > > > > template.
> > > > > 
> > > > > So we are missing a straightforward resolution that Qubes users can 
> > > > > follow.
> > > > > 
> > > > 
> > > > Can you explain this? As far as I can see, the temporary update
> > > > instruction *do* work in a template.
> > > > What makes you think they don't?
> > > 
> > > 
> > > With normal update proxy settings (no cache), this happens:
> > > 
> > > > user@d9:~$ sudo apt -o Acquire::http::AllowRedirect=false update
> > > > Ign:1 http://security.debian.org stretch/updates InRelease
> > > > Hit:2 http://deb.qubes-os.org/r4.0/vm stretch InRelease
> > > > Ign:3 http://deb.debian.org/debian stretch InRelease
> > > > Err:4 http://deb.debian.org/debian stretch Release
> > > > 302  Found
> > > > Err:5 http://security.debian.org stretch/updates Release
> > > >    302  Found
> > > > Reading package lists... Done
> > > > E: The repository 'http://deb.debian.org/debian stretch Release' does 
> > > > no longer have a Release file.
> > > > N: Updating from such a repository can't be done securely, and is 
> > > > therefore disabled by default.
> > > > N: See apt-secure(8) manpage for repository creation and user 
> > > > configuration details.
> > > > E: The repository 'http://security.debian.org stretch/updates Release' 
> > > > does no longer have a Release file.
> > > > N: Updating from such a repository can't be done securely, and is 
> > > > therefore disabled by default.
> > > > N: See apt-secure(8) manpage for repository creation and user 
> > > > configuration details.
> > > 
> > > Did I miss something?
> > 
> > The second part of the instruction in the DSA:
> > 
> >      This is known to break some proxies when used against
> >      security.debian.org. If that happens, people can switch their security
> >      APT source to use:
> > 
> >      deb http://cdn-fastly.deb.debian.org/debian-security stable/updates 
> > main
> 
> Hmmm. I didn't have security.debian.org enabled in the first place (IIRC
> disabled is the default) so at first I dismissed that advice. Then I tried
> adding their source line anyway and got the same warnings.
> 
> I didn't realize, as Ilpo suggested, that I should comment-out the other
> sources temporarily. That did the trick.
> 

deb.debian.org, which you are using, isnt a repository. It's a
placeholder with SRV records pointing to repositories.
If the SRV doesn't work, then it provides a redirect function, which you
are obviously blocking, (as instructed).
The instructions aren't all that clear, since the problem will occur with
any use of deb.debian.org, not just for security repos.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-devel@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/20190123140308.iafpk6bqxzuj2252%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to