Hotmail live connector bug again ...
> Hi,> > If some packages are localy modified, This suggests that your local 
> system is already compromised.> :¬ > > De : Alexander Konovalenko 
> [mailto:[EMAIL PROTECTED] > Envoyé : samedi, 5. avril 2008 06:11> À : 
> [email protected]> Objet : How to verify package integrity 
> after they have been downloaded?> > I would like to verify that some .deb 
> files I downloaded a while ago> (using apt) haven't been tampered with. 
> (Actually, I'll be doing this> kind of thing more than once.) I have the 
> appropriate Release,> Release.gpg and Packages files.> > As the apt-secure(8) 
> manual page states, apt verifies the integrity of> the .deb packages when it 
> downloads them. But it doesn't do so when> installing from cache. To make 
> sure, I manually modified a .deb file> in /var/cache/apt/archives/ and 
> installed that package with apt-get.> The modified package was installed 
> without any warnings.> > (I'm working on Ubuntu 7.10 but I think there's no 
> difference here> between Debian and Ubuntu. Please correct me if I'm wrong.)> 
> > I can verify the signature of the Release file and check the hash-sum> of 
> the Packages file by hand. But there are a lot of .deb files to> verify. I 
> could write a script that would parse the Packages file and> extract the 
> checksums so that its output could be fed to the> {md5,sha1,sha256}sum -c 
> commands. But it would take considerable> effort to make the script robust 
> enough so that it doesn't break on> new or malicious Packages files.> > Is 
> there a simpler way to verify the integrity of .deb packages that> were 
> downloaded with apt?> > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED]> 
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]> > 

Reply via email to