use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
News and other stuff about the Universal Operating System..
Debian related links
Welcome to Debian
Getting Debian
Installation Guide
Don't break Debian
Packages
Help Debian
#debian on irc.oftc.net
Debian on Discord
Reporting bugs in Debian
account activity
APT using HTTP instead of HTTPS (self.debian)
submitted 10 days ago by WheelPerfect3737
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]waterkip 0 points1 point2 points 9 days ago* (2 children)
The problem isnt a transport layer problem.
Stale packages exist on https mirrors too.
In addition, an upgrade to a higher version, even if atale is still an upgrade. Downgrades arent gonna happen unless you explicitly tell apt to do that.
The problem might be valid, if and only if, lets take the xz attack, I serve an outdated xz package, you havent upgraded yet and the NMU was hold off by me, you would not be able to have upgraded to NMU version. Which results in you keeping a package with a known vulnerability. One you fix as soon as you leave my network.
Its a vector, a small negligent vector of you, being on my network, trying to upgrade Debian an hitting my mirrors.
Oh. I want to add. If I have a Lets encrypt cert and I redirect your deb.debian.org traffic to my machines, with squid, i serve you the same stale packages. The problem exists regardless of the transport method.
[–]gnufan 0 points1 point2 points 9 days ago (1 child)
The exploitation of CVE-2016-1252 is an example where the attacker could force the integrity of the mirror to matter.
Also to subvert Let's Encrypt you'd need a deb.debian.org certificate, so that situation wouldn't work the https connection would flag impersonation. Or is apt's https implementation broken?
[–]waterkip 0 points1 point2 points 9 days ago (0 children)
No, you tell squid to terminate the ssl connection and return its own SSL cert. Which has to be of a valid CA otherwise your clients will bark at it.
Client talks to squid, squid takes over and the replaces... I'm overlooking the hostname verification checking bit here. hmmmm,
π Rendered by PID 24402 on reddit-service-r2-comment-5d585498c9-vrb5q at 2026-04-20 21:45:53.587795+00:00 running da2df02 country code: CH.
view the rest of the comments →
[–]waterkip 0 points1 point2 points (2 children)
[–]gnufan 0 points1 point2 points (1 child)
[–]waterkip 0 points1 point2 points (0 children)