This is a great time to double check what AUR packages you have installed and remove stuff you don't need:
pacman -Qm
to check.
Arch Linux
The beloved lightweight distro
As a package maintainer in AUR, I never understood the awe with it. You're literally executing random shell scripts by strangers as root. It's the same thing as curl | sudo bash
except its a lot easier to hide malicious things.
Most people claim they read the PKGBUILD (which I don't believe tbh) but I bet they don't read <package>.install
scripts which don't have to be explicitly mentioned in the PKGBUILD if it shares the same name as the package.
I could push whatever I want to my package and hundreds of people will pick it up. Since I'm not a script kiddie like this guy, I could hide it much better too.
I guess what I'm saying is, don't execute unvetted bash scripts as root kids. Open source doesn't mean people verify the code. It just means they can.
Might as well ditch your computer and grab a notebook.
Because i don't have a track the updates and manage it's uninstall
.install scripts which don’t have to be explicitly mentioned in the PKGBUILD if it shares the same name as the package.
Can you show a reproducible example of this? I couldn't get a .install included in a test package I made without explicitly adding it as install=<package>.install
.
Most people claim they read the PKGBUILD (which I don’t believe tbh)
If you don't trust people to read PKGBUILD's I'm curious which form of software installation (outside of official repositories) you find safe.
Can you show a reproducible example of this? I couldn’t get a .install included in a test package I made without explicitly adding it as install=.install.
I might be misremembering that detail or it might've changed since the last time I wrote a fresh PKGBUILD. Sorry I don't have any examples because my project does not use an install script.
If you don’t trust people to read PKGBUILD’s I’m curious which form of software installation (outside of official repositories) you find safe.
My preference goes Arch repos -> official aur packages that I read the manifests of -> verified flatpaks that I read the manifests of -> Nix -> compile myself
The way Nix handles things seems so cool. And if you want to prevent a program from doing things it's not supposed to then a protocol that makes sure it has it's own copy of everything it's allowed to use would be necessary (if development isn't gonna be super obtuse).
You’re literally executing random shell scripts by strangers as root.
You're literally not doing that. Escalated permissions are needed for installing dependencies and installing the resulting package, not for building. Just try running makepkg
as root and see what happens.
Yes you literally do when you install the package. You're thinking of building the package. makepkg -i
will prompt for root. pacman -U
requires root. Both will execute the install()
function of the PKGBUILD
as root.
Not every PKGBUILD contains a .install file. So again, it is not inherently the case that you’re "literally executing random shell scripts by strangers as root." slackness has it right that most people probably don't read the install files, but it seems to me that their prevalence in the AUR is overstated here.
Why don't you just google (or ask an llm if thats too challenging) instead of making stuff up?
What am I making up? That most AUR packages don't have a .install file? You couldn't be bothered to say what I got wrong or provide any evidence to back it up so I can only assume. But if you have issue with me speculating about how common .install files are in the AUR, fine. Here are some numbers.
Out of the 2500 packages I analyzed, only 19.08% of them had an install
list in their PKGBUILD. One could very easily use the AUR and never, and I quote, "literally [execute] random shell scripts by strangers as root."
I also dug deeper regarding your claim that install files "don't have to be explicitly mentioned in the PKGBUILD if it shares the same name as the package." I can't find any evidence of that. It doesn't have to be listed in the sources, which is probably what you meant.
Clearly these couldn't be the things I'm wrong about, so I await your careful clarification.
Top notch reading comprehension lol
the love of the aur is the lack of friction to distribute and install software. these security breaches are meh they're found and resolved. it'd be nice if we sandboxed applications more.
Yeah good luck sandboxing a service running as root at boot. Maybe look at the malware next time before trying to call it meh?
You asked why people like the AUR and I informed you. not everything is a crisis. peoples computers get compromised every single day. (and yes it sucks for them)
Now you may want to get into a pissing contest over how easy it is to containerize installations on linux today, I personally have no interest in educating peanut gallery commentators.
the basics are: you essentially can't do anything about the applications themselves but securing the installation process is straight forward these days. our package managers are just not funded so the work is slow as shit.
now go outside and touch some grass for everyone's sake.
Starts with:
it’d be nice if we sandboxed applications more.
Turns into:
you essentially can’t do anything about the applications themselves
Not only contradicting with themselves but are also wrong in both cases. I don't know who tf is upvoting this pile of unintelligable crap.
but securing the installation process is straight forward these days.
No.
lol. child. we cant directly do anything if the program itself is compromised outside of sandboxing it. which we do have wrappers for. in fact we have a ton of them now. but sandboxing at the system level is more complicated than at the user level. because either you need to whitelist every possible system access and have it approved or deal with the occassional security issue as this post is about. one is much easier than the other.
but sandboxing the installation process is fairly easy since thats in your package manager. basically just wrap up a bash implementation in a wasi runtime and restrict it and you're golden, you'll have blocked network and filesystem access. all the problems with the installation scripts can be directly controlled via that mechanism.
we just dont do it because its a lot of work with minimal benefit and no one is paying for it to be done.
just because you dont know what the solution space is doesnt mean others dont.
again go touch some grass. you clearly need to.
The higher the percentage of Linux usage the more likely it is that these cases will occur. Most people use Arch because of the aur repository without reading the Pkgbuilds and installing random programs from that repository that give root access to the system. Aur is a security hole in Arch and should only be used for trusted sources and programs that are widely used by the community and yet it is still a security hole for a system. When analysing this issue years ago I understood that it is better for me to have a system with a strong security configuration done by experts in the field. For me a distribution has to have these basic security tools to be considered a secure distribution: secure-boot, selinux and firewall. And along with these tools, do not install anything from external repositories. Only by fulfilling these requirements can we consider that we have a security-enforced linux distribution.
RAT
?
Remote Access Trojan
they send this little guy to hack your pc?