On Wed, Nov 01, 2023 at 11:05:33AM -0400, Christopher wrote: > On Tue, Oct 31, 2023 at 7:50 PM Kevin Fenzi <[email protected]> wrote: > > > > FWIW, from what I can recall, yum used to check all packages, but this > > resulted in tons of people complaining because they did not want it to > > check their local packages. So, a localpkg_gpgcheck option was added and > > set to false. dnf4 still has this option. > > I wasn't aware of that change in behavior. I can't find that option > documented in the man page for dnf or any other readily available docs > about dnf in my installation, or present in my dnf.conf file. I don't
Odd. It's in the dnf.conf man page here in rawhide:
"localpkg_gpgcheck
boolean
Whether to perform a GPG signature check on local packages
(packages in a
file, not in a repository). The default is False. This option
is subject to
the active RPM security policy (see gpgcheck for more details).
"
Looks like it was added to yum 13 years ago:
https://github.com/rpm-software-management/yum/commit/290933489b1aaeb1017d10fb59ccf3231e309115
> remember anybody ever complaining, certainly not "tons of people".
This was 13-14 years ago.
> Using local RPMs is a pretty rare thing. I can't imagine too many
> people complaining about this. It was never much of a burden, and to
> the extent that it was, it was a burden that was a worthwhile tradeoff
> for increased security.
I'm just relaying the history here...
> It's also not clear when this option would take effect. Would it take
> effect if I did `dnf install /path/to/local/file` or just when I did
no, because that looks up that file in your repos and downloads the repo
version of the package.
> `dnf localinstall /path/to/local/file`? What if I did `dnf
yes.
> localinstall remotepath:/to/remote/file`? All of these work, as it
> seems "localinstall" and "install" both just work if given a URL,
> local or remote.
remote path just downloads the file and installs it, so it's the same as
the last case.
> This option seems poorly rolled out, unclear in function, and overall
> bad for security.
Well, nothing was rolled out, it's been that way for 13 years.
Should it be revisited? Sure, and thats what this thread is for?
>
> >
> > It's also worth noting that if you pass yum/dnf/dnf5 urls for the
> > package(s) you want to install, it's not using a repo at all, it's
> > downloading those packages and treating them as local packages.
>
> Is this meant to imply that it doesn't do checks by default whenever
> you pass a URL?! That's even worse! From this user's perspective, a
> URL pointing to a package in a repo, is just a more fully-qualified
> way of specifying the shorthand package name. It seems very odd if
But dnf has no way to know https://foo.bar/packagename is in a repo.
If it is, you should enable the repo and install it with 'dnf install
packagename'.
> passing a fully-qualified path to a remote package results in less
> security than specifying the (possibly ambiguous) shortname for a
> package that DNF resolves via NVR.
Yep.
kevin
signature.asc
Description: PGP signature
_______________________________________________ devel mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
