We all know how common terminal one liners have became as a installation method on GNU/Linux and what are the issues with it but let’s recap quickly.
You go to a pager of some project and it tells you to do curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs/ | sh
or curl -fsSL https://deno.land/install.sh | sh
. The only way to verify that this command will not delete all your files or install malware is to manually review the entire script.
So… why not create a secure script repository? On a central website you would create an account for a project and submit a script. On the other side we would provide a binary client that will download and execute the script (we can call it grunt
from get and run it). So as a user you would run for example grunt rustup
and it would get and execute the script created by rustup project. I imagine it shouldn’t be that difficult to add a tiny package to the major distros.
I believe this would be a fairly simple project that would solve all the security issues typical terminal one liners have.
On the website for uploading scripts we could introduce:
- multi user approval flow for script updates
- 2FA
- static checks of the scripts
- reporting system for compromised scripts
verified project
status
On the client side we could:
- provide info about this script’s security (how many people reviewed it, when was it last updated, is the project verified)
- provide info about downloads (how many time was this script downloaded since the last update)
- do additional checks (maybe the project could provide MD5 of the script on their servers and grunt could verify it?)
So it would look something like this:
# grunt rustp
Downloading rustp.sh from https://getandrun.it/...
Last updated 30 days ago.
Downloads since last update: 5
Verified project: No
Reviewed by 1 user
Execute script [y/N]
Clearly something is wrong…
# grunt rustup
Downloading rustup.sh from https://getandrun.it/...
Last updated 60 days ago.
Downloads since last update: 5342
Verified project: Yes
Reviewed by 3 users
Comparing MD5 checksum with https://rustup.rs/grunt_md5... Passed
Execute script [y/N]
That’s better!
Right? So why don’t we have something like this? Or we do and it simply didn’t get enough traction?
========
So just to address some of the comments. No, it’s not a package manager. Package managers are complex tools that handle versioning, dependencies, updates, uninstalls and so on. Package mangers are also distro specific. A lot of devs decide not to use package managers and use bash scripts that are distro agnostic and don’t rely on external maintainers and packagers. It would be ideal if everyone used secure package managers but the reality is they don’t. This solution is a compromise that offers devs full control of software distribution while introducing decent security.
=======
Someone suggested brew. How do you install brew according to https://brew.sh/ ?
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
See the problem?
I would argue that a centralized, audited system is more secure that thousands for separate websites each doing security in a different, obscure way. Yes, it’s a bigger target but every single package repository has the same issue and everyone agrees it’s more secure then hosting each package on a different server.
It wouldn’t offer discovery of any kind. You wouldn’t do
grunt search brew
. If malicious dev would upload brew installer there no one would know about it. The way to discover packages would be information on official websites. Homebrew would say on their page “To install dogrunt brew
”. The problem of random small projects or uploading scripts for projects you don’t control would not apply here.If someone would just randomly try to do
grunt spotify
it would be like running any other command you don’t understand in the command line. You can’t protect users from that. Withcurl | bash
you’re exposed to security risks even if you understand what you’re doing.Static checks on the server would offer some protection from malicious scripts. Hosting scripts on many different servers doesn’t offer any such protection.
Statistics for scripts would offer additional protection from small, random scripts. Faking a script with millions of downloads will be much harder than simply uploading something.
All this is not perfect but it definitely improves security. Saying it doesn’t is like saying that APT is not more secure than downloading tarballs from ftp servers.