Bug 490703

Summary: Please verify HTTPS certificates when downloading repodata/packages
Product: [Fedora] Fedora Reporter: Miloslav Trmač <mitr>
Component: yumAssignee: Seth Vidal <skvidal>
Status: CLOSED RAWHIDE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: low    
Version: 11CC: anthonybryan, ffesti, herrold, james.antill, pmatilai, tim.lauridsen
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-09-03 15:30:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 461972    

Description Miloslav Trmač 2009-03-17 17:38:23 UTC
rawhide repodata uses HTTPS to download the metalink file, and later links to referenced repodata and packages contains their hashes, which protects against replacing any of the files.

Please add certificate verification to the HTTPS downloads (at least to the metalink download) to close the last opportunity for MITM attacks.  (python-urlgrabber 3.1.0 seems to support certificate verification, you can use the system-wide certificate bundle in  /etc/pki/tls/certs/ca-bundle.crt ).

Comment 1 Bug Zapper 2009-06-09 12:19:21 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 11 development cycle.
Changing version to '11'.

More information and reason for this action is here:
http://fedoraproject.org/wiki/BugZappers/HouseKeeping

Comment 2 seth vidal 2009-09-03 15:30:35 UTC
urlgrabber in rawhide/f12 does this properly and by default.