#include <hallo.h>
* Paul Hampson [Sun, Jun 05 2005, 12:09:17PM]:
> Package: apt-cacher
> Version: 0.9.4
> Severity: normal
> 
> My cron.daily outputs:
> 
> /etc/cron.daily/apt-cacher: Someone is cheating, bad filename found:
> physics.muni.cz_‾yeti_Ftp_enca_all_Packages.gz at
> /usr/share/apt-cacher/apt-cacher-cleanup.pl line 86.
> 
> every night, due to the following site in my sources.list:
> 
> deb http://192.168.0.1/apt-cacher/physics.muni.cz/~yeti/Ftp enca/all/
> deb http://192.168.0.1/apt-cacher/physics.muni.cz/~yeti/Ftp enca/$(ARCH)/
> 
> This means the rest of apt-cacher-cleanup doesn't run, since the error
> is a 'die'.

You can delete that line. Previous versions did not have any
security/obscurity checks either.

> I'd suggest adding '~' to the list of allowable filenames, and making

I must admit, checking the validity of Packages/Sources by filename was
not the smartest idea I have ever had. To be honest, it is pure crap,
there a couple of ways for an attacker to work around that.

Unfortunately, there is AFAICS no good method to ensure that no user
poisons the cache with bad .gz/.bz2 files (on the one hand) and not
becoming to0 paranoid on the other hand (checking .gz files by checksums
and signatures, the whole chain) without creating limitations for users.

Regards,
Eduard.
-- 
Lord Refa: Why should I do as you say?
Ambassador Londo Mollari: Because I have asked you; because your sense of duty
to our people should override any personal ambition; and because I have
poisoned your drink.
                                                 -- Quotes from Babylon 5 --

Reply via email to