Bug 7162
Summary: | Feature suggestion: better trust model. | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Aleksey Nogin <aleksey> |
Component: | rpm | Assignee: | Jeff Johnson <jbj> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 6.1 | CC: | teg |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 1999-11-22 19:23:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Aleksey Nogin
1999-11-19 23:51:37 UTC
I've done some small work on safety-auditing RPM packages, but it's hard. If you assume a malicious RPM author, most if not all of the bets are off (eg, consider an RPM that plunks a trojan version of a commonly used-in-scripts binary down in a spot earlier on root's default $PATH than the real one). Even if you just want to avoid surprises, it's very system and even release-dependant, and thus probably best left to an add-on program that uses information from rpm to work all this out. (Possibly one could make it driven by a configuration file that could be tuned on each system.) When you're installing programs outside a VM, you can do pretty much everything. GPG lets you check if you trust the packager, and that's about all you can do. (you can of course look at scripts and choose not to run them, but that won't help much). Solution: Don't install packages from untrusted sources unless heavily scrutinized. |