Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The same arguments apply for downloading a binary.

If you want to pull this even further. When is the last time you verified the signing keys of your OS distribution repo without relying on the internet?

A lot of install methods that are not curl/sh are like: here copy this bash line to add apt GPG keys for our repo, apt update and install. A lot of people don't bother to check those keys.



True, some people don't check those keys, but it's possible to do. There's a well trodden (and cryptographically secure) path for gaining trust in a key that's distinct from downloading and unpackaging a file.

This is (currently) not possible to do with scripts downloaded from a web page. Especially when immediately piped into a shell.


As with most issues in security its a balance between usability and security. The real problem is the majority of the users will always try to find the path of least resistance. No matter how well documented a secure procedure is, if a user can find a oneliner they will use it instead.

I've seen this in other places as well. Vendor makes a comprehensive guide. Some people condense that to a minimum and will even boast they "made" an easier way to do X or Z, whilst ommiting all the caveats. Of course that will become the popular 'standard' people find. And they'll go complain to the vendor if it doesn't work without even reading the original instructions.


You're not wrong with your first paragraph. That doesn't make the use of curl|sh good however. It doesn't justify developers laziness in eschewing secure methods of distribution, or writing articles like this that justify that same laziness.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: