Opened 3 years ago

Closed 3 years ago

Last modified 3 years ago

#1335 closed defect (wontfix)

pkg-oss uses insecure http:// to download sources and link to content

Reported by: davidjb Owned by:
Priority: minor Milestone:
Component: other Version: 1.13.x
Keywords: Cc:
uname -a:
nginx -V: pkg-oss scripts


As uses HTTPS by default, it would be best to update URLs in pkg-oss to ensure that source packages are downloaded securely. As it currently stands, because downloads take place over insecure HTTP, the file downloaded can't be guaranteed to not have been modified in transport (eg man-in-the-middled). In addition, other URLs such as those in the spec files and documentation would benefit from being changed to help avoid potential MitM attacks.

In a local version of pkg-oss, I did a global find-and-replace of, replacing it with across all files, and everything continues to work fine when packaging. This was at least for RPM-based packages but DEB-based packaging should be fine to change as well.

There should be no downside or risk to this as is already using HTTPS. If any machine using pkg-oss doesn't support HTTPS or has outdated certificates preventing its use, then that's a deeper problem on that machine or OS to resolve.

Change History (4)

in reply to:  description comment:1 by Maxim Dounin, 3 years ago

Replying to davidjb@…:

As uses HTTPS by default

Note that this statement is not really true. Rather, we provide a https version of All official links are to

comment:2 by thresh, 3 years ago

I think the better way to ensure the file was not modified in transit would be to hardcode Maxim's GPG key ID and check if the signature of the downloaded .tar.gz actually matches it. https seems like a band-aid, not really solving the issue here.

comment:3 by Sergey Budnevitch, 3 years ago

Resolution: wontfix
Status: newclosed

comment:4 by davidjb, 3 years ago

@mdounin I forget I have the benefit of HTTPS Everywhere. In that case, I'd strongly encourage you to consider HTTPS by default because browsers are swiftly moving towards marking HTTP as insecure (eg Chrome and you've already got working.

@thresh The better solution is to do both -- transport security and GPG verification, at least not to afford a user some degree of privacy in the process.

I'd welcome this ticket to be re-opened and addressed as the use of https:// links would benefit all users.

Note: See TracTickets for help on using tickets.