Page MenuHomeFreeBSD

pkg: Move FreeBSD-base to pkg.freebsd.org
ClosedPublic

Authored by cperciva on Thu, Nov 27, 9:46 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sat, Dec 6, 6:58 PM
Unknown Object (File)
Sat, Dec 6, 5:08 PM
Unknown Object (File)
Thu, Dec 4, 2:20 PM
Unknown Object (File)
Thu, Dec 4, 9:12 AM
Unknown Object (File)
Thu, Dec 4, 8:08 AM
Unknown Object (File)
Wed, Dec 3, 8:31 AM
Subscribers

Details

Summary

Rather than fetching packages directly from the CDN which currently
backs pkgbase.freebsd.org, requests will go to pkg.freebsd.org mirrors
and be 302ed to the correct servers. This adds ~70 seconds to the
process of installing or upgrading a pkgbase system; it also orphans
systems with 15.0-{PRERELEASE,ALPHA*,BETA*} installed since they are
expecting to see pkgbase files signed with the pkg keys, not the new
pkgbase signing keys.

With hat: re
Requested by: clusteradm, core

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

philip added a subscriber: philip.

We could probably shave off several seconds for many people by replacing pkg+https with pkg+http. The TLS n-way handshake is a complete waste of time. I have made this observation about the other repositories as well but...

Windmills. Have to keep trying.

This revision is now accepted and ready to land.Thu, Nov 27, 10:06 PM

We could probably shave off several seconds for many people by replacing pkg+https with pkg+http. The TLS n-way handshake is a complete waste of time. I have made this observation about the other repositories as well but...

Windmills. Have to keep trying.

Agreed. All https buys us here is quieting an FAQ. It otherwise adds time and potentially has problems in some corporate setups.

We could probably shave off several seconds for many people by replacing pkg+https with pkg+http. The TLS n-way handshake is a complete waste of time. I have made this observation about the other repositories as well but...

Windmills. Have to keep trying.

Agreed. All https buys us here is quieting an FAQ. It otherwise adds time and potentially has problems in some corporate setups.

It does provide a little bit of protection against rollback attacks. Not much, though; there's a reason I used HTTP for freebsd-update.

The main reason I used HTTPS here was because that's what the other repositories used and I wanted to minimize the number of bikesheds I had to paint.

We could probably shave off several seconds for many people by replacing pkg+https with pkg+http. The TLS n-way handshake is a complete waste of time. I have made this observation about the other repositories as well but...

Windmills. Have to keep trying.

Agreed. All https buys us here is quieting an FAQ. It otherwise adds time and potentially has problems in some corporate setups.

It does provide a little bit of protection against rollback attacks. Not much, though; there's a reason I used HTTP for freebsd-update.

The main reason I used HTTPS here was because that's what the other repositories used and I wanted to minimize the number of bikesheds I had to paint.

Yup makes sense to go with what's there already.

The rollback attack is interesting, I had not considered that one.

We could probably shave off several seconds for many people by replacing pkg+https with pkg+http. The TLS n-way handshake is a complete waste of time. I have made this observation about the other repositories as well but...

Windmills. Have to keep trying.

Agreed. All https buys us here is quieting an FAQ. It otherwise adds time and potentially has problems in some corporate setups.

It does provide a little bit of protection against rollback attacks. Not much, though; there's a reason I used HTTP for freebsd-update.

We already protect against those with DNSSEC. You should not be able to resolve an impersonated pkg.FreeBSD.org in a properly configured network. I'm all in favour of defence in depth but the additional security here is so marginal as to be imperceptible and the downsides of HTTPS are many.

The main reason I used HTTPS here was because that's what the other repositories used and I wanted to minimize the number of bikesheds I had to paint.

I can respect that. :)

And, realistically, I don't expect us to be able to revert to HTTP in the short term. The HTTPS-only lobby supported by the WebPKI cartel has comprehensively bullied an entire generation into believing that HTTP cannot be cleartext under any circumstances.

(Meanwhile, I have regulatory requirements banning encryption in some environments I support.)

But we are drifting away from the topic at hand. Sorry for bringing this up. :)

Dnssec just ensures the ip addr is legit. Https ensures the identity of who you are talking to as well as doing crypto.... we also independently sign the pkg, true. But the more barriers to spoofing the better.