Settings

Theme

Attacks against GPG signed APT repositories

blog.packagecloud.io

12 points by jcapote 8 years ago · 13 comments

Reader

whacker 8 years ago

This is such a frustrating clickbait headline!

Most of the 'attack' s are:

1. Plain old bugs in apt. 2. Involve disabling the very security features (GPG and checksum verification) designed to prevent that attack!

  • jdamato 8 years ago

    Hi!

    I'm the author of the article. We never suggest turning off GPG and checksum verification.

    The bugs may be in APT, but they allow several attack vectors against APT, as explained throughout. Let me know if you have any specific questions and I'd be happy to help clear things up!

  • rlpb 8 years ago

    Additionally the article appears to intentionally conflate "issues" such as "if you turn security off" or "if the repository isn't signed" to make their list of possible issues look bigger. None of these are "Attacks against GPG signed APT repositories".

    • jdamato 8 years ago

      We never suggest that you turn security off -- several versions of APT come with various settings defaulted to off, as described in the article.

      All of the attacks presented (replay attacks, freeze attacks, and downgrade attacks) affect GPG signed APT repositories.

    • codedokode 8 years ago

      What about replay attack? Providing apt with old metadata and packages?

      • jdamato 8 years ago

        Yes, plain text APT repositories (signed with GPG or not) are vulnerable to freeze attacks.

      • whacker 8 years ago

        The release files have 'Valid-Until' fields, which will cause apt to reject it on replay.

        • jdamato 8 years ago

          APT will not reject it on replay if the 'Valid-Until' date has not been met yet.

          Imagine a version of, say, libEXAMPLE has a vulnerability allowing remote code execution. The `Valid-Until` date is some time in the future, maybe a few days from now. The authors release a new version of libEXAMPLE to patch the vulnerability and the APT repository metadata is updated.

          However, a malicious actor performing a MitM against your machine has saved the metadata with the vulnerable version. The malicious actor replays that metadata to your system, preventing your system from seeing the newly patched libEXAMPLE. This gives the attacker up until the `Valid-Until` date to attempt to launch an attack against you.

parliament32 8 years ago

The main recommendation is "always serve your apt repo over TLS", however, apt doesn't use TLS by design: https://whydoesaptnotusehttps.com/

  • jdamato 8 years ago

    The website you linked to has several factual errors, as explained in the article.

jwilk 8 years ago

--force-yes is bad, but for reasons that have nothing to do with replay attacks.

This option effectively disables package authentication. This is because it forces "yes" answer to all questions, including the question about installing unauthenticated packages.

jwilk 8 years ago

For a moment I thought there's a new research paper about attacks on APT. Nope. The paper the article links to is from 2008.

  • jdamato 8 years ago

    Yep, and the information is still relevant! The article explains how it applies to recent versions of APT in the current Ubuntu LTS releases.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection