[pca] Incorrect permissions in prepatch for 121118-19

laurent at elanor.org laurent at elanor.org
Fri Nov 25 12:40:37 CET 2011


Quoting Martin Paul <martin at par.univie.ac.at>:
> Very strange. You could try PCA's --nocache option, which will set  
> "cache=off" for wget. A web proxy should then ignore locally cached  
> files and get the file from Oracle.

Didn't change a thing. I also tried from IE on the same box (Linux is  
running in a VM), the same happens.

> Yes. I'd really be interested to know what's going on.  
> Incidentially, I just wanted to remove the whole file detection for  
> patches downloaded from Oracle, as one should only get ZIP files  
> from that source anyway. Your example just showed that this is not  
> true, although this is not normal behaviour and most probably just a  
> local, one-time error. So I will put my change into the next  
> development release anyway. Just be aware that it your case you'll  
> then end up with a .zip file which is actually a JAR. At the end it  
> probably won't matter anyway.

I've pushed the issue to the admins of the proxy, I'll let you know  
what they find.

However, I believe we are hitting a fundamental flaw of the Oracle  
patch download system here:

If you go back to my previous email with the debug run, the request  
for the patch is secure:  
https://updates.oracle.com/all_unsigned/121118-19.zip

If the patch were *really* downloaded as httpS, then the proxy would  
not be able to tamper with it.
BUT that https link then redirects to an http one, and the actual  
download is clear-text.

So the question is, what is the level of trust we can have in those  
unsigned patches? A funky antivirus is bad enough, but if there were  
DNS poisoning, the redirect could send us about anywhere and download  
anything, it'd be unnoticeable.

Laurent




More information about the pca mailing list