[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Q: Use https for {deb,security}.debian.org by default



On 2021-08-20 11:36:41 +0200 (+0200), Bjørn Mork wrote:
> Jeremy Stanley <fungi@yuggoth.org> writes:
> 
> > While this does complicate it, a snooping party can still know the
> > site they're connecting to via SNI happening unencrypted,
> 
> I believe this can be fixed with TLS 1.3?
> 
> > and packet sizes/pacing likely give away which pages or files are
> > being retrieved based on their length.
> 
> Yes, probably looking into territory where you'd not want to directly
> access any public service at all here..
> 
> > And that's not even getting into
> > how "trusted" certificate authorities give away certificates for any
> > hostname if your MitM knows the right people,
> 
> Debian is among the few who publish TLSA records (DANE).  Which is still
> pretty useless for normal web srvices since the major browser vendors
> refuse to support it.  But TLSA validation could easily be implemented
> in apt-transport-https. Maybe it is?  That would prevent this problem.
> 
> > and CDNs are now in
> > the business of snooping on everyone's traffic for sites where they
> > handle SSL/TLS termination. HTTPS as deployed on the open Internet
> > is a sip of security with several gulps of theater.
> 
> Not much to do if you don't trust your own servers, whether they are CDN
> frontends or whatever.

I agree with all of the above, my point was that the current state
of HTTPS doesn't especially improve integrity for Debian package
management over the signed indices and checksums we already rely on,
and trying to use HTTPS for privacy/secrecy (which isn't really what
it was designed for) is still and perhaps even increasingly
misguided. Of course lots of people will continue to expect magic
HTTPS fairy dust to protect them and ward off evil, but the only
legitimate reason I can see for Debian changing the default protocol
for sources.list entries is to avoid having to pointlessly debate
the minimal benefits of HTTPS with people who drink whatever
cool-aid they're told by security "experts" (HTTP bad, HTTPS good,
drink up!).
-- 
Jeremy Stanley

Attachment: signature.asc
Description: PGP signature


Reply to: