Of all the weird and wonderful excuses I've seen for Web sites and
downloads being insecure, I don't think I've ever seen someone claim
that using TLS "opens us up to the TLS/SSL server and client side
vulnerabilities". Opens us up compared to what, exactly? If you mean
that an attacker could take advantage of a briefly-known TLS library
vulnerability (like Goto Fail) to MITM the HTTPS download, remember that
*they can already do that right now all the time* with HTTP downloads.

As far as I know Ubuntu isn't served using a CDN, and even if it was,
plenty of CDNs provide HTTPS. And I'm well aware that requiring HTTPS
would make mirroring more difficult, but in the equivalent RT I
suggested that Let's Encrypt could be a solution to that.
<https://letsencrypt.org/>

GPG-signed checksums might have been relevant in the first few months of
Ubuntu's existence, when you could reasonably expect that a large
proportion of downloaders would (a) bother to check them at all and (b)
have the faintest idea what a "GnuPG web of trust" was. But neither of
those has been remotely true for over a decade.

"Incomplete" is for bug reports that lack enough information to
reproduce them. If that applies to this report, please let me know.

** Changed in: ubuntu
       Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359836

Title:
  Ubuntu ISOs downloaded insecurely, over HTTP rather than HTTPS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1359836/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to