zlacker

[return to "Detecting the use of "curl | bash" server-side"]
1. cjbpri+e2[view] [source] 2018-07-29 02:26:42
>>rubyn0+(OP)
Neat! But it's not obviously a bad idea. You have a TLS connection with the site you're downloading from. `curl | bash` is no worse than downloading a .dmg or .deb from the same server would be.
◧◩
2. vbezhe+p2[view] [source] 2018-07-29 02:30:38
>>cjbpri+e2
deb/rpm is better because it's usually signed by maintainer with GPG keys. I think that it's harder to steal keys from maintainer than to infiltrate web server.
◧◩◪
3. cjbpri+r3[view] [source] 2018-07-29 02:52:00
>>vbezhe+p2
For the most part you receive the GPG keys over the same TLS connection, though.
◧◩◪◨
4. fulafe+K6[view] [source] 2018-07-29 04:01:12
>>cjbpri+r3
That's an antipattern, should use keyservers.
◧◩◪◨⬒
5. dredmo+pg[view] [source] 2018-07-29 08:01:55
>>fulafe+K6
Still not safe.

Verify key signatures.

And I really wish GPG had a negative trust signature.

◧◩◪◨⬒⬓
6. Dylan1+Hk[view] [source] 2018-07-29 10:04:27
>>dredmo+pg
Verify it against what?
◧◩◪◨⬒⬓⬔
7. dredmo+Bl[view] [source] 2018-07-29 10:26:47
>>Dylan1+Hk
See what keys have signed a given key. See Debian maintainer keys as an example.

This is ... not everything that it could be, and is approaching 30 years old, technology built for a vastly different world.

But this is the basis of the GPG / PGP Web of Trust.

https://en.wikipedia.org/wiki/Web_of_trust

http://www.pgpi.org/doc/pgpintro/

http://www.rubin.ch/pgp/weboftrust.en.html

(I've addressed this point ... a distressing number of times on HN: https://hn.algolia.com/?query=dredmorbius%20web%20of%20trust... 0

◧◩◪◨⬒⬓⬔⧯
8. dcbada+6p[view] [source] 2018-07-29 11:35:08
>>dredmo+Bl
Have you contacted maintainers if they're willing to do this? Is there a way to configure apt to verify chain of trust?
[go to top]