Skip to content

binary builder should check authenticity and integrity of downloaded packages #4

Closed
@gberche-orange

Description

@gberche-orange

Thanks for sharing this great work for building buildpack binaries!

As discussed into cloudfoundry/java-buildpack-dependency-builder#6 the buildpacks binary builder should strive to verify authenticiy and integrity of downloaded artefacts

For example in https://github.com/cloudfoundry/binary-builder/blob/master/templates/httpd_blueprint.sh.erb#L8-L9 the builder is currently vulnerable to man in the midddle attacks that could return compromised packages.

In the case of apache, apache source packages are digitally signed with apache public keys, and should be checked by the binary builder.

Other cases might check against checksum downloaded through HTTPS on the main distrib (and not mirror).
http://apache.mirrors.tds.net/apr/#sig

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions