mitm threat with apt












0















I think* there is a recent zdnet article about a potential mitm threat-- but I'm not quite sure whether to take the advice or not. Specifically, is there a hive mind that already knows the/some of the proxies that might be affected by not allowing redirects on update & upgrade commands?



https://www.zdnet.com/article/nasty-security-bug-found-and-fixed-in-linux-apt/



Also, I think what's being suggested is to turn off redirects, run a patch, and then update again. Never having run a patch like this before, I'm cautious. Don't see a lot of discussion of this here already. Did I miss it?










share|improve this question







New contributor




ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.

























    0















    I think* there is a recent zdnet article about a potential mitm threat-- but I'm not quite sure whether to take the advice or not. Specifically, is there a hive mind that already knows the/some of the proxies that might be affected by not allowing redirects on update & upgrade commands?



    https://www.zdnet.com/article/nasty-security-bug-found-and-fixed-in-linux-apt/



    Also, I think what's being suggested is to turn off redirects, run a patch, and then update again. Never having run a patch like this before, I'm cautious. Don't see a lot of discussion of this here already. Did I miss it?










    share|improve this question







    New contributor




    ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      0












      0








      0








      I think* there is a recent zdnet article about a potential mitm threat-- but I'm not quite sure whether to take the advice or not. Specifically, is there a hive mind that already knows the/some of the proxies that might be affected by not allowing redirects on update & upgrade commands?



      https://www.zdnet.com/article/nasty-security-bug-found-and-fixed-in-linux-apt/



      Also, I think what's being suggested is to turn off redirects, run a patch, and then update again. Never having run a patch like this before, I'm cautious. Don't see a lot of discussion of this here already. Did I miss it?










      share|improve this question







      New contributor




      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I think* there is a recent zdnet article about a potential mitm threat-- but I'm not quite sure whether to take the advice or not. Specifically, is there a hive mind that already knows the/some of the proxies that might be affected by not allowing redirects on update & upgrade commands?



      https://www.zdnet.com/article/nasty-security-bug-found-and-fixed-in-linux-apt/



      Also, I think what's being suggested is to turn off redirects, run a patch, and then update again. Never having run a patch like this before, I'm cautious. Don't see a lot of discussion of this here already. Did I miss it?







      apt patch






      share|improve this question







      New contributor




      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked Jan 24 at 19:55









      ksfksf

      1




      1




      New contributor




      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      ksf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          1 Answer
          1






          active

          oldest

          votes


















          0














          No such acrobatics are necessary. YOU do not need to patch apt. The Ubuntu Security Team has already patched apt for you.



          If you are using Unattended Upgrades, then you already have the patched version of apt.



          If you are paranoid about security (not a bad thing!), then download the patched apt package yourself from https://packages.ubuntu.com. Be sure to pick the correct version for your release of Ubuntu.






          share|improve this answer
























          • You may also be interested in apt-transport-https, though some say this adds minimal security.

            – earthmeLon
            Jan 24 at 21:21











          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "89"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });






          ksf is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112609%2fmitm-threat-with-apt%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          No such acrobatics are necessary. YOU do not need to patch apt. The Ubuntu Security Team has already patched apt for you.



          If you are using Unattended Upgrades, then you already have the patched version of apt.



          If you are paranoid about security (not a bad thing!), then download the patched apt package yourself from https://packages.ubuntu.com. Be sure to pick the correct version for your release of Ubuntu.






          share|improve this answer
























          • You may also be interested in apt-transport-https, though some say this adds minimal security.

            – earthmeLon
            Jan 24 at 21:21
















          0














          No such acrobatics are necessary. YOU do not need to patch apt. The Ubuntu Security Team has already patched apt for you.



          If you are using Unattended Upgrades, then you already have the patched version of apt.



          If you are paranoid about security (not a bad thing!), then download the patched apt package yourself from https://packages.ubuntu.com. Be sure to pick the correct version for your release of Ubuntu.






          share|improve this answer
























          • You may also be interested in apt-transport-https, though some say this adds minimal security.

            – earthmeLon
            Jan 24 at 21:21














          0












          0








          0







          No such acrobatics are necessary. YOU do not need to patch apt. The Ubuntu Security Team has already patched apt for you.



          If you are using Unattended Upgrades, then you already have the patched version of apt.



          If you are paranoid about security (not a bad thing!), then download the patched apt package yourself from https://packages.ubuntu.com. Be sure to pick the correct version for your release of Ubuntu.






          share|improve this answer













          No such acrobatics are necessary. YOU do not need to patch apt. The Ubuntu Security Team has already patched apt for you.



          If you are using Unattended Upgrades, then you already have the patched version of apt.



          If you are paranoid about security (not a bad thing!), then download the patched apt package yourself from https://packages.ubuntu.com. Be sure to pick the correct version for your release of Ubuntu.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Jan 24 at 20:10









          user535733user535733

          8,17722943




          8,17722943













          • You may also be interested in apt-transport-https, though some say this adds minimal security.

            – earthmeLon
            Jan 24 at 21:21



















          • You may also be interested in apt-transport-https, though some say this adds minimal security.

            – earthmeLon
            Jan 24 at 21:21

















          You may also be interested in apt-transport-https, though some say this adds minimal security.

          – earthmeLon
          Jan 24 at 21:21





          You may also be interested in apt-transport-https, though some say this adds minimal security.

          – earthmeLon
          Jan 24 at 21:21










          ksf is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          ksf is a new contributor. Be nice, and check out our Code of Conduct.













          ksf is a new contributor. Be nice, and check out our Code of Conduct.












          ksf is a new contributor. Be nice, and check out our Code of Conduct.
















          Thanks for contributing an answer to Ask Ubuntu!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1112609%2fmitm-threat-with-apt%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          數位音樂下載

          格利澤436b

          When can things happen in Etherscan, such as the picture below?