Is it right to assume installing from a .deb file is safe? Is adding software from a personal or community PPA any better?
Announcement
Collapse
No announcement yet.
Am I willingly jeopardising my o/s security?
Collapse
This topic is closed.
X
X
-
Hi....
Not necessarily, in my opinion. I've even had Ubuntu warn me about this (I forgot the exact message,) when I've installed software from places like this. I've done it to get the software I needed or wanted but I don't believe it's 100% safe.
Regards...Our Lord and Savior Jesus Christ loves and cares about you most of all! http://peacewithgod.jesus.net/
How do I know this personally? Please read here: https://www.linuxquestions.org/quest...hn-8-12-36442/
PLEASE LISTEN TO THIS PODCAST! You don't have to end up here: https://soulchoiceministries.org/pod...i-see-in-hell/
- Top
- Bottom
-
Originally posted by bra|10n View PostIs it right to assume installing from a .deb file is safe?
A deb file can contain anything, and even though you can inspect a deb package to see what it wishes to install, most packages include compiled binaries and there's no way to tell what those do.
Theoretically, it's not even safe to compile things yourself, unless you've read and understood the source code (and the source of your compiler, libraries etc.)...so obviously you have to place a "line of trust" somewhere if you wish to use your computer.
Malicious deb files are relatively rare, though, so common sense goes a long a way..."moneydoubler3000.deb" from a dubious website should ring the alarm bells.
Obviously the safest method is not installing any 3rd party debs if you can help it...but just sticking to the official repos isn't 100% safe either (nothing really is 100% safe).Last edited by kubicle; May 04, 2012, 05:43 AM.
- Top
- Bottom
Comment
-
Well I did some reading about deb packages and excuse me in advance for oversimplifying this but as I understood it, a deb file contains a data archive of the essential files needed to build a package.
The other files included in the deb are generated as a result of building the deb package itself if I remember correctly.
So my question is, why can't we build deb packages from inside Launchpad or some similar safe environment, putting together all the various bit's n pieces needed just like a recipe, and then idealy hit a button labelled "Make deb Now?"
Is this any way feasable or have I got the whole concept wrong?Kubuntu 12.04 - Acer Aspire 5750G
"I don't make a great deal of money, but I'm ok with that 'cause I don't hurt a lot of people in the process either"
- Top
- Bottom
Comment
-
Originally posted by bra|10n View PostSo my question is, why can't we build deb packages from inside Launchpad or some similar safe environment, putting together all the various bit's n pieces needed just like a recipe, and then idealy hit a button labelled "Make deb Now?"
Building your own debs from the ubuntu repos doesn't mean much security wise, though. If you're willing to trust the source code in the ubuntu repos (as most people are) you can reasonably trust the debs built as well (even if you don't build them yourselves).Last edited by kubicle; May 04, 2012, 08:32 AM.
- Top
- Bottom
Comment
-
The situation is possibly that of "chain of evidence".
There are many "bleeding edge" distros, #! comes to mind, that have VERY experienced people in them who make .deb packages as easily as I make a cup of instant coffee. And if one spends time at the fora one sees that the people have "known each other" for a long time and trust the debs that the various people make.
If one trusts the original file and the intermediate builds in the chain then one can trust the final product.
There used to be a Linux from down in South America where the few folks involved with it ONLY provided the very basic bare bones of the distro. In other words you got the basic frame, the menu system, you got wireless, only the very necessities and EVERYBODY was to build at least one .deb and contribute it to the repo and then you could be a permanent person on the forum.
The fundamental idea was "basically" sound but it just never really took off and, one of the main reasons that I think that happened was that "Linux" moved away from the model of "one need, one application". We now have very complex apps, and not just Libre Office. It used to be one used XMMS and it still is a great player, but most folks want something like Songbird or Amarok which provide a smorgasboard of options. I've even forgotten the name.
woodsmoke
- Top
- Bottom
Comment
-
Originally posted by bra|10n View Posta deb file contains a data archive of the essential files needed to build a package.
So my question is, why can't we build deb packages from inside Launchpad or some similar safe environment, putting together all the various bit's n pieces needed just like a recipe, and then idealy hit a button labelled "Make deb Now?"
ppa's are extra repos that untrusted users can create so that you can can receive updates to packages that aren't in the official repos or that exists in older versions. They are only to be trusted as much as you trust the ppa creator and this also goes for separate deb files that exist on the net.
You can build debs your self, that way you are only relying on trusting the original author of the software (and any patches you want to use), which is generally safer if you can read the source code (someone else probably has already if its popular enough).
Personally I quite like the way archlinux handles the problem, you have the core repos that are created by trusted users, you can add custom repos if you really want to or install packages found on the internet (but both of these methods aren't used often) and they have a repo of source packages (the AUR) which users can download, check the contents and build the package them selves if they trust it (which is the preferred way arch users do things)
Originally posted by kubicle View PostIf you're willing to trust the source code in the ubuntu repos (as most people are) you can reasonably trust the debs built as well (even if you don't build them yourselves).
- Top
- Bottom
Comment
-
Originally posted by james147 View PostI would only trust them if they where built by someone I trusted... otherwise how knows what the user could have added to the package before sending it to you?
http://askubuntu.com/questions/52858...e-from-malware
Yes...I'm seriously clumsy at editing...I blame the forum software, obviously:
What makes the repos so safe is that only trusted users can place the debs in them and they get checked by others that are also trusted.Last edited by kubicle; May 04, 2012, 02:43 PM.
- Top
- Bottom
Comment
-
-
There is a vetting process before one can post to launchpad, and packages posted there have to be signed. If you (or the community) trusts the developer and his signature verifies, then you can be sure he wrote that package.
Also, packages like chkrootkit and rkhunter, if installed, run in cron and keep track of changes. If changes occur they can send you an email notifying you of changes. IF you expected file X to be changed by installing app Y but you notice file Z was also changed, but wasn't part of the "installed files" list, then you should check it out."A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
-
Thank you everyone for your replies
I was more asking why there didn't seem to be a way to build debs within a safe environment rather than download debs from the net and just having to trust they are clean.
As to the safest environment this explains it well,
Originally Posted by GreyGeek...
There is a vetting process before one can post to launchpad, and packages posted there have to be signed. If you (or the community) trusts the developer and his signature verifies, then you can be sure he wrote that package.
Originally Posted by kubicle...
Building deb packages from source isn't that hard and there are tools that help creating them (for example, software that is available on the ubuntu repos can be built into a deb package with 'apt-get source --compile <package>' if the source repos are enabled)...that's what the ubuntu build-servers do 24/7, compile uploaded source packages into deb packages
The only other point I see is this.
If I create a deb using the above means and method and wish to share it, the debs 'verification as a clean build' seems lost and the recipient is suddenly in a 'trust' situation.
This seems a waste to me.
But thank you all for your knowledge and thoughts.Kubuntu 12.04 - Acer Aspire 5750G
"I don't make a great deal of money, but I'm ok with that 'cause I don't hurt a lot of people in the process either"
- Top
- Bottom
Comment
-
Pan-Galactic QuordlepleenSo Long, and Thanks for All the Fish
- Jul 2011
- 9524
- Seattle, WA, USA
- Send PM
Another element that should enter your calculation is an estimate of the likelihood of acquiring malware. The official repos, both the binaries and the sources, are highly unlikely to be distributors of malware, so my estimation of infection from those locations is practically zero. Individual PPAs on Launchpad are by definition not as trustworthy, but because PPAs publish source code plus binaries, you can always check the source code yourself. However, the number of people who really know how to spot vulnerabilities or malware in source code is actually quite smaller than typically imagined. Although the "many eyes" argument is something of a red herring, the simple availability of one's source code means that some people will take a gander, and if one routinely writes crappy code that's riddled with rookie security holes, word will get out -- fast.
If the source for your favorite software isn't in Launchpad, perhaps you can find it elsewhere, like in a Git repository. Clone it, then compile. You'll be doing the same thing that everyone else who uses that software does. And again, if it's leaking your PII all over the place, someone else has probably already discovered that and notified the author.
- Top
- Bottom
Comment
Comment