• Limonene@lemmy.world
    link
    fedilink
    arrow-up
    43
    ·
    4 days ago

    Article doesn’t mention my biggest problem with flatpaks, that the packages are not digitally signed. All major Linux distros sign their packages, and flathub should too. I would prefer to see digital signatures from both flathub and the package’s maintainer. I don’t believe flathub has either one currently.

    • Ethan@programming.dev
      link
      fedilink
      English
      arrow-up
      31
      ·
      4 days ago

      It is possible to sign a flatpak, but yeah distributors need to actually do that and flathub should require published flatpaks to be signed.

      • Creat@discuss.tchncs.de
        link
        fedilink
        arrow-up
        16
        arrow-down
        1
        ·
        4 days ago

        I have no idea why you’re being down voted. The whole thing with flatpacks is that they come from a large number of individuals, maybe the author of the software, but often not from a central organization you can trust. That’s the fundamental difference to distro repos, who can just have a single anchor for trust.

        Mindlessly signing something doesn’t increase security in any way. Then requiring it just means hassle to having to add keys to be trusted every time you want to install anything. Malicious actors can just create a key and sign the package as well. That’s the whole reason it isn’t required in the first place.

      • Limonene@lemmy.world
        link
        fedilink
        arrow-up
        7
        arrow-down
        1
        ·
        edit-2
        4 days ago

        Mozilla, for example, would sign Firefox’s flatpak with a PGP key that they would disclose on their website. You verify the signature using the RSA algorithm (or any other algorithm for digital signatures. There are a bunch.) Or, you could just trust that your connection wasn’t tampered the first time, then you would have the public key, and it would verify each time that the package came from that same person. Currently, you have to trust every time that your connection isn’t tampered.

        Major flatpak providers (Flathub at the very least) would include their PGP public key in the flatpak software repo, and operating system vendors would distribute that key in the flatpak infrastructure for their operating system, which itself is signed by the operating system’s key.

        • FizzyOrange@programming.dev
          link
          fedilink
          arrow-up
          8
          ·
          4 days ago

          that they would disclose on their website

          Wouldn’t it make more sense then for them to simply host the Flatpak themselves? I kind of thought that was the whole idea of Flatpak.

          • Kazumara@discuss.tchncs.de
            link
            fedilink
            arrow-up
            7
            ·
            4 days ago

            Best to do both, really, so a record of using a consistent public key is created.

            Then supply chain attacks might be noticed. If someone manages to replace the file on the webserver but can’t get to the signing key you’ve prevented the attack.