On Fri, May 30, 2014, at 10:49 PM, Chris Boot wrote: > >> The cryptographic signatures that are validated automatically by apt. > > > > What's stopping the attacker from serving a compromised apt? > > Oh god not this again. > > How exactly does using HTTPS solve this particular problem, anyway? If > we assume a compromised APT then surely it can pass invalid SSL > certificates as perfectly valid, too. It's not like sponsored attackers > don't have access to all the SSL certificates they might ever want > anyway.
By mandating HTTPS, it would prevent QuantumInsert and FoxAcid being implemented during Debain installs and later package installs/updates. If you're worried about SSL certificates being compromised, going down the path of Debian self-signing its own certificate and distributed it via SneakerNet would be a way to prevent it. Alfie -- Alfie John alf...@fastmail.fm -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1401454841.3847.123280441.07217...@webmail.messagingengine.com