1284
submitted 11 months ago* (last edited 11 months ago) by Pantherina@feddit.de to c/linux@lemmy.ml

stolen from linux memes at Deltachat

you are viewing a single comment's thread
view the rest of the comments
[-] milkjug@lemmy.wildfyre.dev 4 points 11 months ago

ngl, I love how "I don't give a fuck" the slackware authors are, they didn't even bother with https on their official website.

[-] interceder270@lemmy.world -2 points 11 months ago

You don't need SSL if you're not exchanging sensitive information.

If they aren't exchanging sensitive information, then it's less not giving a fuck and more not using technologies 'just because' everyone else is.

It's a smart move.

[-] Chobbes@lemmy.world 5 points 11 months ago

I mean… I would consider anywhere that you might download software from sensitive. This isn’t really a smart move. And sure, the mirror’s page they link to uses https, but if the regular site doesn’t a man-in-the-middle could change the url and serve an official looking malicious version… I wouldn’t consider putting your users at an elevated risk when it’s relatively easy to set up TLS “a smart move”.

[-] interceder270@lemmy.world 1 points 11 months ago

but if the regular site doesn’t a man-in-the-middle could change the url and serve an official looking malicious version

What do you think is stopping someone from doing this?

[-] Chobbes@lemmy.world 1 points 11 months ago

Who says it hasn’t happened? :P

If it hasn’t I would just assume that Slackware isn’t a big enough target and that anybody in the position to man-in-the-middle a large number of people would have better targets. I mean, to be clear TLS is not a silver bullet either, but it goes a long way for ensuring the integrity of the data you receive over the internet in addition to hiding the contents.

Distros usually sign their ISOs with PGP as well (Slackware does this), so it’s a good idea to verify those signatures as it’s a second channel that you can use to double check the validity of the ISO (but I’m not sure many people actually do this). Of course, anybody can make PGP keys so you have to find out which key is actually supposed to be signing the iso, otherwise an attacker can just make a bogus key and tell you that that’s the Slackware signing key (on the official website too, because it doesn’t use tls!). The web of trust arguably helps some (though this can be faked as well unless you actually participate in key signing parties or something), and you can hope that the Slackware public key is mirrored in several places that you trust so you can compare them… but at the end of the day for most people all trust in the distribution comes from the domain name, and if you don’t have TLS certificates you’re kind of setting up a weak foundation of trust… Maybe it will be fine because you’re not a big enough target for somebody to bother, but in this day and age it’s pretty much trivial to set up TLS certificates and that gets you a far better foundation… why take the risk? Why is it smart to unnecessarily expose your users to more risk than necessary?

this post was submitted on 22 Nov 2023
1284 points (93.5% liked)

Linux

48152 readers
758 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS