Bug#956276: runescape: downloads unverified binary and runs it
Stephen Kitt
skitt at debian.org
Thu Apr 9 12:58:53 BST 2020
Le 09/04/2020 13:44, Markus Koschany a écrit :
> Am 09.04.20 um 13:24 schrieb Stephen Kitt:
>> On Thu, 9 Apr 2020 12:37:03 +0200, Markus Koschany <apo at debian.org>
>> wrote:
>>> Am 09.04.20 um 11:36 schrieb Ivo De Decker:
>>>> It seems runescape downloads a binary and runs it, without verifying
>>>> its
>>>> integrity. At least the download happens using https, but no other
>>>> verification is done.
>>>
>>> Could you quote the relevant part of Debian Policy, that requires
>>> verification (and what kind of verification) of downloaded files. Is
>>> downloading of verified orig tarballs now a requirement or is it
>>> still
>>> just sufficient to download the tarball and verify its integrity by
>>> hand?
>>
>> This is a bit different: runescape downloads a binary the first time
>> it’s
>> run by any given user, so each user can potentially get a different
>> binary.
>> Checking orig tarballs (whether using a signing key or manually)
>> produces a
>> result which remains the same for all users...
>
> How is this any different? It is possible that tarballs from github.com
> differ each time a user is downloading them, but we don't require
> verification. Where is this documented in Debian Policy as a "must"
> requirement?
Installing a Debian package doesn’t involve downloading a tarball from
github.com or anywhere else. A packager downloads the tarball, vets it
in some way or other (hopefully), and then uploads it to Debian
infrastructure, where it is used to build the binary packages which
users eventually download. After the initial upload, the contents don’t
change, unless a new version is uploaded.
Put another way, when you install a Debian package, you get the exact
same contents as any other user installing the same version of the
package, and thus a certain amount of collective trust can be built.
This isn’t necessarily the case with the runescape package.
> Note that we are talking about a non-free game here. The user has to
> trust the publisher and there is nothing Debian can do about it. We
> only
> provide a simple helper script to download the binary, which is done
> about a secure transport channel. This is just a little more convenient
> than to download it directly with your favorite web browser.
Oh I know, we can’t do anything about trusting the publisher. The main
issue is that if for whatever reason a compromised JAR is put in place
on the upstream site, the runescape package will download it and run it
without any warning. Even the TLS protection doesn’t do much since the
download script doesn’t check the upstream certificate (so the site
could be hijacked and it would still work).
Consider it this way: the packager will presumably check the package
before upload, and we can consider the JAR at that point to be
trustworthy (for some value of trustworthy). But there is absolutely no
guarantee that the JAR which users will receive bears any resemblance to
the JAR checked by the packager.
Regards,
Stephen
More information about the Pkg-games-devel
mailing list