Hacker News new | past | comments | ask | show | jobs | submit login

Although this isn't new, it should make you throw up in your mouth a little bit.

Malicious compromise is not the only way that an install script can become broken, or corrupted, on a remote site. The ability to checksum what you're running is a very useful sanity check and you should be doing it with all downloaded scripts/packages.

I suppose this is tilting at windmills, though.




> Malicious compromise is not the only way that an install script can become broken, or corrupted, on a remote site. The ability to checksum what you're running is a very useful sanity check and you should be doing it with all downloaded scripts/packages.

Yes, and you still can do that. But the standard installation instructions almost never include it. For example, nginx's build instructions boil down to "run configure, possibly with some flags, and then run make and/or make install". That includes the exact same vulnerability you complain of here — it never tells you to checksum anything. This is true for essentially all the software I've ever downloaded. So again, still not "becoming a thing."

The assumption is that if you're the sort of person who customarily checks code before they install it, you know how to inject that step.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: