On 1/19/24, Max Nikulin wrote:
When adding a third-party repository, evaluate that GPG key you are
going to add really belongs to repository maintainers.

The sentence above is important to get the next phrase right.

On 19/01/2024 22:22, Albretch Mueller wrote:
On 1/19/24, Max Nikulin wrote:
Precise steps
depend on degree of your paranoia.
[...]
  I have always believe that Debian’s basic assumptions about using the
Internet as a relatively secure, “private” venue are definitely more
worryingly irrational than my paranoia.

Debian does not control 3rd party repositories. It is up to users to decide if they trust such repositories and if they trust web pages containing an identifiers of GPG public keys.

Actually even in the case of official Debian images you need to get identifiers of GPG keys. Do you trust https://debian.org/? Are you sure that browser's certificate storage doesn't contain an extra certificate? Are you sure that you are not visiting an alternative site and some certification authority from "official" ones has not issued an alternative debian.org certificate? A particular WiFi hotspot might have malicious DNS and might direct you to a site looking like debian.org, but containing another set of GPG keys and pointing to specially crafted download links.

APT is secure even for HTTP, but it needs proper GPG keys. APT might be insecure even for HTTPS if the user adds a malicious repository and GPG keys for it (or if the user disables GPG signatures checks).

Reply via email to