Credit to Peter Mahnke and others on Canonical’s Web & Design team for converting ubuntu.com to HTTPS, and separately for embedding the exact verification terminal command — with checksum included, and even a Copy button! — on the (now-HTTPS) “Thank you” page when downloading standard LTS-desktop, latest-desktop, LTS-server, and latest-server images. (I’m now on that team, but I wasn’t involved in that work, and opinions here are my own.)
The instructions as written don’t work on macOS or other BSDs, Chrome OS, or (without great effort) Windows, but those are fixable. And releases.ubuntu.com, cloud-images.ubuntu.com, old-releases.ubuntu.com, and mirror file listings are still HTTP with no verification instructions, though people using those sites are perhaps more willing and able to work it out for themselves. However, the current verification system can’t protect, *in a way that HTTPS would*: * people not willing/bothering to run the verification command (probably the biggest category) * Windows users not knowing/willing/able to install either Microsoft File Checksum Integrity Verifier or, as suggested in the linked tutorial, Ubuntu for Windows (download a second copy of Ubuntu just to verify your download of the first copy? really?) * Windows S Mode users not knowing/willing to switch out of S Mode. Of course, as Thomas wrote, “the attacker could create a new mirror … perfectly secured via https”. (Though if they did, at the very least, we’d remove them from the list of mirrors!) Or they could attack your browser’s key store such that it trusts shonky certificates, or engage in corporate sabotage, or find an SSL zero-day like Dimitri mentioned, or, or, or … The point here is not to protect against every possible attack. The point is to reduce the attack surface. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1359836 Title: Ubuntu ISOs downloaded insecurely, over HTTP rather than HTTPS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1359836/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs