Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upChange Debian 8 template to use apt-transport-https by default #1539
Comments
marmarek
added
enhancement
P: major
C: Debian
release-notes
labels
Dec 25, 2015
marmarek
added this to the Release 3.1 milestone
Dec 25, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 25, 2015
Member
First of all it requires #1188 which is only present in R3.1 - so not going to happen in R3.0. But other than that, it worth consideration.
Possible downsides:
- not able make use of (transparent) caching
Alternatives:
- download updates over Tor (which is already an option in R3.1), related to #1159
/cc @adrelanos
|
First of all it requires #1188 which is only present in R3.1 - so not going to happen in R3.0. But other than that, it worth consideration. Possible downsides:
Alternatives:
/cc @adrelanos |
added a commit
to adrelanos/qubes-builder-debian
that referenced
this issue
Dec 25, 2015
adrelanos
referenced this issue
in marmarek/qubes-builder-debian
Dec 25, 2015
Merged
install the apt-transport-https package by default #23
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 25, 2015
Member
Created marmarek/qubes-builder-debian#23 to install apt-transport-https by default. Not a big deal. Small change. Small package.
If however it makes sense to update over https depends on how much one trusts the broken SSL CA system in relation to their adversaries.
|
Created marmarek/qubes-builder-debian#23 to install apt-transport-https by default. Not a big deal. Small change. Small package. If however it makes sense to update over https depends on how much one trusts the broken SSL CA system in relation to their adversaries. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mig5
Dec 28, 2015
Just implementing this myself now on templates carried over from 3.0 to 3.1. I think there isn't any alternative mirror for the security updates available at http://security.debian.org. And there isn't any HTTPS for security.debian.org (disappointed). So correct me if I'm wrong but this will always be only a partial fix that Qubes project can't solve :(
mig5
commented
Dec 28, 2015
|
Just implementing this myself now on templates carried over from 3.0 to 3.1. I think there isn't any alternative mirror for the security updates available at http://security.debian.org. And there isn't any HTTPS for security.debian.org (disappointed). So correct me if I'm wrong but this will always be only a partial fix that Qubes project can't solve :( |
marmarek
modified the milestones:
Far in the future,
Release 3.1
Feb 8, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
May 17, 2016
Member
It's trivially easy to assess which packages are being installed under TLS, so privacy is illusory.
As @mig says, Debian security updates are not available by HTTPS, so method cant be absolute default.
@adrelanos has already added apt-transport-https method.
Is there any purpose in shipping templates with HTTPS across all sources except security.debian.org ?
|
It's trivially easy to assess which packages are being installed under TLS, so privacy is illusory. As @mig says, Debian security updates are not available by HTTPS, so method cant be absolute default. |
added a commit
that referenced
this issue
May 31, 2016
rootkovska
removed
the
C:
label
Jun 30, 2016
andrewdavidwong
added
the
C: Debian
label
Jul 1, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
Jul 1, 2016
Possible downsides:
- not able make use of (transparent) caching
Indeed.
You can get HTTPS+caching for Debian packages if you use qubes-updates-cache and remove the comment character from line 9 of /etc/qubes-updates-cache/urls.conf (and from line 4 for Fedora packages).
rustybird
commented
Jul 1, 2016
•
Indeed. You can get HTTPS+caching for Debian packages if you use qubes-updates-cache and remove the comment character from line 9 of /etc/qubes-updates-cache/urls.conf (and from line 4 for Fedora packages). |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
Nov 25, 2016
Member
@marmarek @isislovecruft
can we move on this?
- @adrelanos has added support for apt-transport-https, so users can easily configure if they wish;
- Debian security isn't available at all via https
- It's straightforward to identify package updates over TLS
- The fedora templates use http and https
I would leave as present and leave it to users to configure, but if it's decided to move to default https it's a trivial change.
|
@marmarek @isislovecruft
I would leave as present and leave it to users to configure, but if it's decided to move to default https it's a trivial change. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 25, 2016
Member
I'd also leave as it is. Much easier (in terms of configuration) solution is to connect template through Whonix Gateway - which gives much more than https (you can hide that you download updates at all, not only what updates). It is even possible to select such option during installation.
|
I'd also leave as it is. Much easier (in terms of configuration) solution is to connect template through Whonix Gateway - which gives much more than https (you can hide that you download updates at all, not only what updates). It is even possible to select such option during installation. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
@andrewdavidwong Please close "Won't Fix" |
isislovecruft commentedDec 25, 2015
In my opinion, the default Debian setting of using plaintext HTTP for package updates presents something of a security concern, since a passive adversary watching the update process gains information regarding which packages are installed and their current versions. I would strongly prefer that adversaries not know which versions of software they should be looking for bugs in in order to attack me. Debian has stalled on changing this for some time, but I see no valid reason why Qubes should persist in the same poor decisions.
Would Qubes consider having
apt-transport-httpsinstalled in the Debian 8 template by default, and using an HTTPS mirror (e.g. https://mirrors.kernel.org/debian)?