5 years since bug initially reported...
I had a look at the code and compared it with some real signed repositories and 
it looks to me that:

1) The directory structure should be deeper. It looks like there should be a 
real binary-i386 (or whatever) directory

2) The make_release_file() function makes a stub release file (based on overall 
configuration) which is fine in the binary-i386 directories, but in the top 
level this should then be updated later on and never is.

3) That updating could be done with
system("apt-ftparchive release . >> Release") from the top level directory

4) That top level directory needs to be signed, if the repository is going to 
be trusted by apt-get/synaptic/etc.

5a) Ideally To reduce the potential window for malicious versions being 
inserted and then signed, then there should be a verification of the checksums 
in the previously-existing Packages file(s) before it's replaced by 
apt-ftparchive (only newly built packages should have changed)...

5b) Also, of course, the previously existing Packages files should have their 
checksums verified against the top level Release file and the previously 
existing Release file should be verified against the signature.

David

---- Content & Policy Scan by M+ Guardian ----
Millions of safe & clean messages delivered daily





--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to