-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
builtin:fetchurl: Enable TLS verification #11585
Conversation
This is better for privacy and to avoid leaking netrc credentials in a MITM attack, but also the assumption that we check the hash no longer holds in some cases (in particular for impure derivations). Partially reverts 5db358d.
de5edbb
to
7b39cd6
Compare
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
…1585 builtin:fetchurl: Enable TLS verification (backport #11585)
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/nix-2-24-8-release-to-fix-builtin-fetchurl-security-issue/52732/1 |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: |
This is better for privacy and to avoid leaking netrc credentials in a MITM attack, but also the assumption that we check the hash no longer holds in some cases (in particular for impure derivations). Partially reverts NixOS/nix@5db358d. (cherry picked from commit c04bc17a5a0fdcb725a11ef6541f94730112e7b6) (cherry picked from commit f2f47fa725fc87bfb536de171a2ea81f2789c9fb) (cherry picked from commit 7b39cd631e0d3c3d238015c6f450c59bbc9cbc5b) Upstream-PR: NixOS/nix#11585 Change-Id: Ia973420f6098113da05a594d48394ce1fe41fbb9
This is better for privacy and to avoid leaking netrc credentials in a MITM attack, but also the assumption that we check the hash no longer holds in some cases (in particular for impure derivations). Partially reverts NixOS/nix@5db358d. upstream commits: (cherry picked from commit c04bc17a5a0fdcb725a11ef6541f94730112e7b6) (cherry picked from commit f2f47fa725fc87bfb536de171a2ea81f2789c9fb) (cherry picked from commit 7b39cd631e0d3c3d238015c6f450c59bbc9cbc5b) lix main: (cherry picked from commit c1631b0) Upstream-PR: NixOS/nix#11585 Change-Id: Ia973420f6098113da05a594d48394ce1fe41fbb9
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/announcing-determinate-nix/54709/114 |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/announcing-determinate-nix/54709/117 |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: |
Motivation
Once upon a time we disabled this because we didn't have access to the certificates in the sandbox, and verification wasn't really needed because we're checking the hash of the download afterwards. But these days we do have access to certificates in the sandbox, and features like impure derivations make the second assumption no longer valid. So let's re-enable checking.
Context
Priorities and Process
Add 👍 to pull requests you find important.
The Nix maintainer team uses a GitHub project board to schedule and track reviews.