]> git.saurik.com Git - apt.git/blame_incremental - test/integration/test-apt-update-nofallback
treat older Release files than we already have as an IMSHit
[apt.git] / test / integration / test-apt-update-nofallback
... / ...
CommitLineData
1#!/bin/sh
2#
3# ensure we never fallback from a signed to a unsigned repo
4#
5# hash checks are done in
6#
7set -e
8
9simulate_mitm_and_inject_evil_package()
10{
11 redatereleasefiles '+1 hour'
12 rm -f $APTARCHIVE/dists/unstable/InRelease
13 rm -f $APTARCHIVE/dists/unstable/Release.gpg
14 inject_evil_package
15}
16
17inject_evil_package()
18{
19 cat > $APTARCHIVE/dists/unstable/main/binary-i386/Packages <<EOF
20Package: evil
21Installed-Size: 29
22Maintainer: Joe Sixpack <joe@example.org>
23Architecture: all
24Version: 1.0
25Filename: pool/evil_1.0_all.deb
26Size: 1270
27Description: an autogenerated evil package
28EOF
29 # avoid ims hit
30 touch -d '+1hour' aptarchive/dists/unstable/main/binary-i386/Packages
31}
32
33assert_update_is_refused_and_last_good_state_used()
34{
35 testfailuremsg "E: The repository 'file: unstable Release' is no longer signed." aptget update
36
37 assert_repo_is_intact
38}
39
40assert_repo_is_intact()
41{
42 testsuccessequal "foo/unstable 2.0 all" apt list -q
43 testsuccess aptget install -y -s foo
44 testfailure aptget install -y evil
45 testsuccess aptget source foo --print-uris
46
47 LISTDIR=rootdir/var/lib/apt/lists
48 if ! ( ls $LISTDIR/*InRelease >/dev/null 2>&1 ||
49 ls $LISTDIR/*Release.gpg >/dev/null 2>&1 ); then
50 echo "Can not find InRelease/Release.gpg in $(ls $LISTDIR)"
51 msgfail
52 fi
53}
54
55setupaptarchive_with_lists_clean()
56{
57 setupaptarchive --no-update
58 rm -rf rootdir/var/lib/apt/lists
59}
60
61test_from_inrelease_to_unsigned()
62{
63 # setup archive with InRelease file
64 setupaptarchive_with_lists_clean
65 testsuccess aptget update
66 listcurrentlistsdirectory > lists.before
67
68 simulate_mitm_and_inject_evil_package
69 assert_update_is_refused_and_last_good_state_used
70 testfileequal lists.before "$(listcurrentlistsdirectory)"
71}
72
73test_from_release_gpg_to_unsigned()
74{
75 # setup archive with Release/Release.gpg (but no InRelease)
76 setupaptarchive_with_lists_clean
77 rm $APTARCHIVE/dists/unstable/InRelease
78 testsuccess aptget update
79 listcurrentlistsdirectory > lists.before
80
81 simulate_mitm_and_inject_evil_package
82 assert_update_is_refused_and_last_good_state_used
83 testfileequal lists.before "$(listcurrentlistsdirectory)"
84}
85
86test_from_inrelease_to_unsigned_with_override()
87{
88 # setup archive with InRelease file
89 setupaptarchive_with_lists_clean
90 # FIXME: is not what the server reported 4104 4106
91 testsuccess aptget update #-o Debug::pkgAcquire::Worker=1
92
93 # simulate moving to a unsigned but otherwise valid repo
94 simulate_mitm_and_inject_evil_package
95 generatereleasefiles
96
97 # and ensure we can update to it (with enough force)
98 testwarning aptget update --allow-insecure-repositories \
99 -o Acquire::AllowDowngradeToInsecureRepositories=1
100 # but that the individual packages are still considered untrusted
101 testfailureequal "WARNING: The following packages cannot be authenticated!
102 evil
103E: There are problems and -y was used without --force-yes" aptget install -qq -y evil
104}
105
106test_cve_2012_0214()
107{
108 # see https://bugs.launchpad.net/ubuntu/+source/apt/+bug/947108
109 #
110 # it was possible to MITM the download so that InRelease/Release.gpg
111 # are not delivered (404) and a altered Release file was send
112 #
113 # apt left the old InRelease file in /var/lib/apt/lists and downloaded
114 # the unauthenticated Release file too giving the false impression that
115 # Release was authenticated
116 #
117 # Note that this is pretty much impossible nowdays because:
118 # a) InRelease is left as is, not split to InRelease/Release as it was
119 # in the old days
120 # b) we refuse to go from signed->unsigned
121 #
122 # Still worth having a regression test the simulates the condition
123
124 # setup archive with InRelease
125 setupaptarchive_with_lists_clean
126 testsuccess aptget update
127 listcurrentlistsdirectory > lists.before
128
129 # do what CVE-2012-0214 did
130 rm $APTARCHIVE/dists/unstable/InRelease
131 rm $APTARCHIVE/dists/unstable/Release.gpg
132 inject_evil_package
133 # build valid Release file
134 aptftparchive -qq release ./aptarchive > aptarchive/dists/unstable/Release
135
136 assert_update_is_refused_and_last_good_state_used
137 testfileequal lists.before "$(listcurrentlistsdirectory)"
138
139 # ensure there is no _Release file downloaded
140 testfailure ls rootdir/var/lib/apt/lists/*_Release
141}
142
143test_subvert_inrelease()
144{
145 # setup archive with InRelease
146 setupaptarchive_with_lists_clean
147 testsuccess aptget update
148 listcurrentlistsdirectory > lists.before
149
150 # replace InRelease with something else
151 mv $APTARCHIVE/dists/unstable/Release $APTARCHIVE/dists/unstable/InRelease
152
153 testfailureequal "W: Failed to fetch file:${APTARCHIVE}/dists/unstable/InRelease Does not start with a cleartext signature
154
155E: Some index files failed to download. They have been ignored, or old ones used instead." aptget update -qq
156
157 # ensure we keep the repo
158 testfileequal lists.before "$(listcurrentlistsdirectory)"
159 assert_repo_is_intact
160}
161
162test_inrelease_to_invalid_inrelease()
163{
164 # setup archive with InRelease
165 setupaptarchive_with_lists_clean
166 testsuccess aptget update
167 listcurrentlistsdirectory > lists.before
168
169 # now remove InRelease and subvert Release do no longer verify
170 sed -i 's/Codename.*/Codename: evil!'/ $APTARCHIVE/dists/unstable/InRelease
171 inject_evil_package
172
173 testwarningequal "W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: file: unstable InRelease: The following signatures were invalid: BADSIG 5A90D141DBAC8DAE Joe Sixpack (APT Testcases Dummy) <joe@example.org>
174
175W: Failed to fetch file:${APTARCHIVE}/dists/unstable/InRelease The following signatures were invalid: BADSIG 5A90D141DBAC8DAE Joe Sixpack (APT Testcases Dummy) <joe@example.org>
176
177W: Some index files failed to download. They have been ignored, or old ones used instead." aptget update -qq
178
179 # ensure we keep the repo
180 testfailure grep 'evil' rootdir/var/lib/apt/lists/*InRelease
181 testfileequal lists.before "$(listcurrentlistsdirectory)"
182 assert_repo_is_intact
183}
184
185test_release_gpg_to_invalid_release_release_gpg()
186{
187 # setup archive with InRelease
188 setupaptarchive_with_lists_clean
189 rm $APTARCHIVE/dists/unstable/InRelease
190 testsuccess aptget update
191 listcurrentlistsdirectory > lists.before
192
193 # now subvert Release do no longer verify
194 echo "Some evil data" >> $APTARCHIVE/dists/unstable/Release
195 inject_evil_package
196
197 testwarningequal "W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: file: unstable Release: The following signatures were invalid: BADSIG 5A90D141DBAC8DAE Joe Sixpack (APT Testcases Dummy) <joe@example.org>
198
199W: Failed to fetch file:${APTARCHIVE}/dists/unstable/Release.gpg The following signatures were invalid: BADSIG 5A90D141DBAC8DAE Joe Sixpack (APT Testcases Dummy) <joe@example.org>
200
201W: Some index files failed to download. They have been ignored, or old ones used instead." aptget update -qq
202
203 testfailure grep 'evil' rootdir/var/lib/apt/lists/*Release
204 testfileequal lists.before "$(listcurrentlistsdirectory)"
205 assert_repo_is_intact
206}
207
208
209TESTDIR=$(readlink -f $(dirname $0))
210. $TESTDIR/framework
211
212setupenvironment
213configarchitecture "i386"
214
215# a "normal" package with source and binary
216buildsimplenativepackage 'foo' 'all' '2.0'
217
218# setup the archive and ensure we have a single package that installs fine
219setupaptarchive
220APTARCHIVE=$(readlink -f ./aptarchive)
221assert_repo_is_intact
222
223# test the various cases where a repo may go from signed->unsigned
224msgmsg "test_from_inrelease_to_unsigned"
225test_from_inrelease_to_unsigned
226
227msgmsg "test_from_release_gpg_to_unsigned"
228test_from_release_gpg_to_unsigned
229
230# ensure we do not regress on CVE-2012-0214
231msgmsg "test_cve_2012_0214"
232test_cve_2012_0214
233
234# ensure InRelase can not be subverted
235msgmsg "test_subvert_inrelease"
236test_subvert_inrelease
237
238# ensure we revert to last good state if InRelease does not verify
239msgmsg "test_inrelease_to_invalid_inrelease"
240test_inrelease_to_invalid_inrelease
241
242# ensure we revert to last good state if Release/Release.gpg does not verify
243msgmsg "test_release_gpg_to_invalid_release_release_gpg"
244test_release_gpg_to_invalid_release_release_gpg
245
246# ensure we can override the downgrade error
247msgmsg "test_from_inrelease_to_unsigned_with_override"
248test_from_inrelease_to_unsigned_with_override