<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=3942&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / How to inspect 3rd Party .deb packages before installing!]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=3942</link>
		<description><![CDATA[The most recent posts in How to inspect 3rd Party .deb packages before installing!.]]></description>
		<lastBuildDate>Thu, 12 Nov 2020 18:01:27 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25822#p25822</link>
			<description><![CDATA[<div class="quotebox"><cite>swarfendor437 wrote:</cite><blockquote><div><p>extract the content of data.tar.gz file</p></div></blockquote></div><p>The control.tar.gz (or control.tar.xz) should also be extracted to examine the contents of any installation scripts. Note that <span class="bbc">tar</span> auto-extracts these days so only <span class="bbc">xf</span> is needed to unpack any tarball regardless of the compression paradigm.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Thu, 12 Nov 2020 18:01:27 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25822#p25822</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25817#p25817</link>
			<description><![CDATA[<div class="quotebox"><cite>swarfendor437 wrote:</cite><blockquote><div><p>I avoid posting the code here to discourage miscreants</p></div></blockquote></div><p>Presumably just some variation on rm -rf /* or an obfuscation of such then. IMO if you execute commands from some random post as root without understanding what they do, you deserve what you get.<br />If I instructed you to set your PC on fire, you&#039;d rightly ignore that as well, would you not?</p><div class="quotebox"><cite>swarfendor437 wrote:</cite><blockquote><div><p>opendesktop.org and all its offshoots (Pling.com, KDEdesktop, gnome-look.org all have themes which people may look at and install without deference to any PPA.</p></div></blockquote></div><p>Themes are pretty much always installable without root privileges (and so cannot wipe the whole drive and can be tested with a throwaway account), rarely have any call at all to be packaged as a .deb, and are usually either human-readable to begin with or come with source code you can inspect.<br />Most theme engines have an explicitly non-executable format anyway, so if something is packaged as a .deb or an installer script, you&#039;d be wise to ask yourself why that is...</p><p>In general, the only &quot;safe&quot; source for any precompiled binary software is the distro maintained repository, and that&#039;s exactly as safe as the maintainers are vigilant. Any &quot;user contributed&quot; stuff is usually completely unchecked, because when it comes to FOSS in general it&#039;s anticipated that the user can and will inspect the source code.</p><div class="quotebox"><cite>yeti wrote:</cite><blockquote><div><p>Instead of installing binary debs compiled elsewhere, build that stuff from its deb-sources on your target system or even better, do it on a throw away VM.</p></div></blockquote></div><p>That is indeed the better option, not only do you get a chance to see the source, you also ensure the resulting binary is linked against the correct libs.<br />Personally I&#039;d consider a VM overkill (though useful for building packages for other distros), fakeroot and the debian packaging tools do a pretty good job of ensuring you only need root for the final installation, so you can do all building etc. as a dedicated unprivileged user.</p><p>All those people who hose their systems messing with sources.list or installing .debs from random places could have avoided that pain by spending the 10 minutes to learn how to rebuild a package from source, it&#039;s not difficult.</p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Thu, 12 Nov 2020 00:03:49 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25817#p25817</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25813#p25813</link>
			<description><![CDATA[<p>I extract .deb&#039;s with the right mouse button menu dialog using Dolphin file manager, It allows me to check out all the parts if I am having trouble, especially when the bin file gets put in a distant galaxy. or something is deleted when I don&#039;t know why.</p>]]></description>
			<author><![CDATA[dummy@example.com (GlennW)]]></author>
			<pubDate>Wed, 11 Nov 2020 22:37:41 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25813#p25813</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25810#p25810</link>
			<description><![CDATA[<p>Instead of installing binary debs compiled elsewhere, build that stuff from its deb-sources on your target system or even better, do it on a throw away VM.</p>]]></description>
			<author><![CDATA[dummy@example.com (yeti)]]></author>
			<pubDate>Wed, 11 Nov 2020 20:36:32 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25810#p25810</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25805#p25805</link>
			<description><![CDATA[<div class="quotebox"><cite>steve_v wrote:</cite><blockquote><div><p>Well this <em>is</em> one of the (many) reasons installing packages from random websites / PPAs / blindly pasting commands from blog posts is considered a bad idea. Doubly so if you do it as root... But then if you&#039;re installing random .debs as root you are entirely responsible for your own mess.</p><div class="quotebox"><cite>swarfendor437 wrote:</cite><blockquote><div><p>the file once extracted executed ‘Unix’ commands</p></div></blockquote></div><p>Orly, &quot;Unix commands&quot;... As opposed to some other kind of commands, or is that just to sound extra scary?</p><p>On a more constructive note, a great many archive utilities can open .deb archives in memory, such as KDE&#039;s ark or the good old midnight commander. Personally I find browsing .debs with mc a lot nicer than using dpkg to print the contents, unless I want to pipe the output of course.</p></div></blockquote></div><p>I avoid posting the code here to discourage miscreants but it was the code used to remove all contents of the hard drive akin to removing a directory. When I was a moderator on another forum we had spammers posting the same code who had circumvented the phpBB forum as it then was with the heading &#039;How to speed up your Linux install&#039;. <img src="http://dev1galaxy.org/img/smilies/wink.png" width="15" height="15" alt="wink" /></p><p>And bearing in mind opendesktop.org and all its offshoots (Pling.com, KDEdesktop, gnome-look.org all have themes which people may look at and install without deference to any PPA. Any other safe sources for themes?</p>]]></description>
			<author><![CDATA[dummy@example.com (swarfendor437)]]></author>
			<pubDate>Wed, 11 Nov 2020 17:00:58 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25805#p25805</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25801#p25801</link>
			<description><![CDATA[<p>Well this <em>is</em> one of the (many) reasons installing packages from random websites / PPAs / blindly pasting commands from blog posts is considered a bad idea. Doubly so if you do it as root... But then if you&#039;re installing random .debs as root you are entirely responsible for your own mess.</p><div class="quotebox"><cite>swarfendor437 wrote:</cite><blockquote><div><p>the file once extracted executed ‘Unix’ commands</p></div></blockquote></div><p>Orly, &quot;Unix commands&quot;... As opposed to some other kind of commands, or is that just to sound extra scary?</p><p>On a more constructive note, a great many archive utilities can open .deb archives in memory, such as KDE&#039;s ark or the good old midnight commander. Personally I find browsing .debs with mc a lot nicer than using dpkg to print the contents, unless I want to pipe the output of course.</p>]]></description>
			<author><![CDATA[dummy@example.com (steve_v)]]></author>
			<pubDate>Wed, 11 Nov 2020 10:50:00 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25801#p25801</guid>
		</item>
		<item>
			<title><![CDATA[Re: How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25795#p25795</link>
			<description><![CDATA[<p>As a Cinnamon user I use GDebi if I want to install and view, for audit purposes, off-package Debs (including viewing their install scripts). <br />Much simpler.</p>]]></description>
			<author><![CDATA[dummy@example.com (Marjorie)]]></author>
			<pubDate>Tue, 10 Nov 2020 23:58:54 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25795#p25795</guid>
		</item>
		<item>
			<title><![CDATA[How to inspect 3rd Party .deb packages before installing!]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=25794#p25794</link>
			<description><![CDATA[<p>These should always be inspected before ‘extracting’ as whilst not a virus,<br />malicious code could be lurking there:</p><p>&quot;I always open the debs and check for suspicious post-install scripts<br />This is how to do that. …<br />Listing the files from a debian package using dpkg -c<br />dpkg is the package manager for debian. So using dpkg command you can list<br />and extract the packages, as shown below.<br />To view the content of *.deb file:</p><p>&#160; &#160; </p><div class="codebox"><pre><code>    :
    $ dpkg -c ovpc_1.06.94-3_i386.deb
    dr-xr-xr-x root/root
    0 2010-02-25 10:54 ./
    dr-xr-xr-x root/root
    0 2010-02-25 10:54 ./ovpc/
    dr-xr-xr-x root/root
    0 2010-02-25 10:54 ./ovpc/pkg/
    dr-xr-xr-x root/root
    0 2010-02-25 10:54 ./ovpc/pkg/lib/
    dr-xr-xr-x root/root
    0 2010-02-25 10:48 ./ovpc/pkg/lib/header/
    -r-xr-xr-x root/root
    130 2009-10-29 17:06 ./ovpc/pkg/lib/header/libov.so
    .
    .
    .
    -r-xr-xr-x root/root
    131 2009-10-29 17:06 ./ovpc/pkg/etc/conf
    dr-xr-xr-x root/root
    0 2010-02-25 10:54 ./ovpc/pkg/etc/conf/log.conf</code></pre></div><p>Extracting the files from a debian package using dpkg -x<br />Use dpkg -x to extract the files from a deb package as shown below.</p><p>&#160; &#160; </p><div class="codebox"><pre><code>    :
    $ dpkg -x ovpc_1.06.94-3_i386.deb /tmp/ov
    $ ls /tmp/ov
    ovpc
    </code></pre></div><p>DEB files are ar archives, which always contains the three files — debian-binary,<br />control.tar.gz, and data.tar.gz. We can use ar command and tar command to<br />extract and view the files from the deb package, as shown below.<br />First, extract the content of *.deb archive file using ar command.</p><p>&#160; &#160; </p><div class="codebox"><pre><code>    :
    $ ar -vx ovpc_1.06.94-3_i386.deb
    x - debian-binary
    x - control.tar.gz
    x - data.tar.gz
    $ </code></pre></div><p>Next, extract the content of data.tar.gz file as shown below.</p><p>&#160; &#160; </p><div class="codebox"><pre><code>    :
    $ tar -xvzf data.tar.gz
    ./
    ./ovpc/
    ./ovpc/pkg/
    ./ovpc/pkg/lib/
    ./ovpc/pkg/lib/header/
    ./ovpc/pkg/lib/header/libov.so
    .
    .
    ./ovpc/pkg/etc/conf
    ./ovpc/pkg/etc/conf/log.con
    &quot;
    </code></pre></div><p>[With acknowledgement to Blackwolf on ultimateeditionoz.com forum – sadly<br />the forum is no more].</p><p>There was an instance of a GNU/Linux theme uploaded to gnome-look.org<br />called Ubundows that had not been checked by Admin for that site; the file<br />once extracted executed ‘Unix’ commands to wipe the hard drive clean of all<br />content - YOU HAVE BEEN WARNED!</p>]]></description>
			<author><![CDATA[dummy@example.com (swarfendor437)]]></author>
			<pubDate>Tue, 10 Nov 2020 21:08:57 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=25794#p25794</guid>
		</item>
	</channel>
</rss>
