curl https://some-url/ | sh

I see this all over the place nowadays, even in communities that, I would think, should be security conscious. How is that safe? What’s stopping the downloaded script from wiping my home directory? If you use this, how can you feel comfortable?

I understand that we have the same problems with the installed application, even if it was downloaded and installed manually. But I feel the bar for making a mistake in a shell script is much lower than in whatever language the main application is written. Don’t we have something better than “sh” for this? Something with less power to do harm?

  • Zron@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    For security reasons, I review every line of code before it’s executed on my machine.

    Before I die, I hope to take my ‘93 dell optiplex out of its box and finally see what this whole internet thing is about.

  • Artyom@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    What’s stopping the downloaded script from wiping my home directory?

    What’s stopping any Makefile, build script, or executable from running rm -rf ~? The correct answer is “nothing”. PPAs are similarly open, things are a little safer if you only use your distro’s default package sources, but it’s always possible that a program will want to be able to delete something in your home directory, so it always has permission.

    Containerized apps are the only way around this, where they get their own home directory.

    • easily3667@lemmus.org
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      edit-2
      1 month ago

      Don’t forget your package manager, running someone’s installer as root

      It’s roughly the same state as when windows vista rolled out UAC in 2007 and everything still required admin rights because that’s just how everything worked…but unlike Microsoft, Linux distros never did the thing of splitting off installs into admin vs unprivileged user installers.

  • ikidd@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    When I modded some subreddits I had an automod rule that would target curl-bash pipes in comments and posts, and remove them. I took a fair bit of heat over that, but I wasn’t backing down.

    I had a lot of respect for Tteck and had a couple discussions with him about that and why I was doing that. I saw that eventually he put a notice up that pretty much said what I did about understanding what a script does, and how the URL you use can be pointed to something else entirely long after the commandline is posted.

  • thomask@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 month ago

    The security concerns are often overblown. The bigger problem for me is I don’t know what kind of mess it’s going to make or whether I can undo it. If it’s a .deb or even a tarball to extract in /usr/local then I know how to uninstall.

    I will still use them sometimes but for things I know and understand - e.g. rustup will put things in ~/.rustup and update the PATH in my shell profile and because I know that’s what it does I’m happy to use the automation on a new system.

      • thomask@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 month ago

        So tell me: if I download and run a bash script over https, or a .deb file over https and then install it, why is the former a “security nightmare” and the latter not?

          • FizzyOrange@programming.dev
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            Hilarious, but not a security issue. Just shitty Bash coding.

            And I agree it’s easier to make these mistakes in Bash, but I don’t think anyone here is really making the argument that curl | bash is bad because Bash is a shitty error-prone language (it is).

            Definitely the most valid point I’ve read in this thread though. I wish we had a viable alternative. Maybe the Linux community could work on that instead of moaning about it.

            • moonpiedumplings@programming.dev
              link
              fedilink
              English
              arrow-up
              0
              arrow-down
              1
              ·
              1 month ago

              Hilarious, but not a security issue. Just shitty Bash coding.

              It absolutely is a security issue. I had a little brain fart, but what I meant to say was “Security isn’t just protection from malice, but also protection from mistakes”.

              Let’s put it differently:

              Hilarious, but not a security issue. Just shitty C coding.

              This is a common sentiment people say about C, and I have a the same opinion about it. I would rather we use systems in place that don’t give people the opportunity to make mistakes.

              I wish we had a viable alternative. Maybe the Linux community could work on that instead of moaning about it.

              Viable alternative for what? Packaging.

              I personally quite like the systems we have. The “install anything from the internet” is exactly how Windows ends up with so much malware. The best way to package software for users is via a package manager, that not only puts more eyes on the software, but many package managers also have built in functionality that makes the process more reliable and secure. For example signatures create a chain of trust. I really like Nix as a distro-agnostic package manager, because due to the unique way they do things, it’s impossible for one package’s build process to interfere with another.

              If you want to do “install anything from the internet” it’s best to do it with containers and sandboxing. Docker/podman for services, and Flatpak for desktop apps, where it’s pretty easy to publish to flathub. Both also seem to be pretty easy, and pretty popular — I commonly find niche things I look at ship a docker image.

              • FizzyOrange@programming.dev
                link
                fedilink
                arrow-up
                0
                arrow-down
                1
                ·
                1 month ago

                This is a common sentiment people say about C, and I have a the same opinion about it. I would rather we use systems in place that don’t give people the opportunity to make mistakes.

                The issue with C is it lets you make mistakes that commonly lead to security vulnerabilities - allowing a malicious third party to do bad stuff.

                The Bash examples you linked are not security vulnerabilities. They don’t let malicious third parties do anything. They done have CVEs, they’re just straight up data loss bugs. Bad ones, sure. (And I fully support not using Bash where feasible.)

                Viable alternative for what? Packaging.

                A viable way to install something that works on all Linux distros (and Mac!), and doesn’t require root.

                The reason people use curl | bash is precisely so they don’t have to faff around making a gazillion packages. That’s not a good answer.

        • jagged_circle@feddit.nl
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 month ago

          You’re telling me that you dont verify the signatures of the binaries you download before running them too?!? God help you.

          I download my binaries with apt, which will refuse to install the binary if the signature doesn’t match.

          • FizzyOrange@programming.dev
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            No because there’s very little point. Checking signatures only makes sense if the signatures are distributed in a more secure channel than the actual software. Basically the only time that happens is when software is distributed via untrusted mirror services.

            Most software I install via curl | bash is first-party hosted and signatures don’t add any security.

            • jagged_circle@feddit.nl
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 month ago

              All publishing infrastructure shouldn’t be trusted. Theres countless historical examples of this.

              Use crypto. It works.

              • FizzyOrange@programming.dev
                link
                fedilink
                arrow-up
                0
                ·
                1 month ago

                Crypto is used. It is called TLS.

                You have to have some trust of publishing infrastructure, otherwise how do you know your signatures are correct?

                • jagged_circle@feddit.nl
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  1 month ago

                  TLS is a joke because of X.509.

                  We dont need to trust any publishing infrastructure because the PGP private keys don’t live on the publishing infrastructure. We solved this issue in the 90s

  • serenissi@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Unpopular opinion, these are handy for quickly installing in a new vm or container (usually throwaway) where one don’t have to think much unless the script breaks. People don’t install thing on host or production multiple times, so anything installed there is usually vetted and most of the times from trusted sources like distro repos.

    For normal threat model, it is not much different from downloading compiled binary from somewhere other than well trusted repos. Windows software ecosystem is famously infamous for exactly the same but it sticks around still.

  • lemmeBe@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    I think safer approach is to:

    1. Download the script first, review its contents, and then execute.
    2. Ensure the URL uses HTTPS to reduce the risk of man-in-the-middle attacks
    • Steve Dice@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      If you’ve downloaded and audited the script, there’s no reason to pipe it from curl to sh, just run it. No https necessary.

      • isaaclw@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        The https is to cover the factthat you might have missed something.

        I guess I download and skim out of principle, but they might have hidden something in there.

        • Steve Dice@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 month ago

          Wat. All https does is encrypt the connection when downloading. If you’ve already downloaded the file to audit it, then it’s in your drive, no need to use curl to download it again and then pipe it to sh. Just click the thing.

          • lemmeBe@sh.itjust.works
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            Yeah, https was for downloading it in the first place. My bad, I didn’t get my thoughts out in the right order.

  • zygo_histo_morpheus@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    You have the option of piping it into a file instead, inspecting that file for yourself and then running it, or running it in some sandboxed environment. Ultimately though, if you are downloading software over the internet you have to place a certain amount of trust in the person your downloading the software from. Even if you’re absolutely sure that the download script doesn’t wipe your home directory, you’re going to have to run the program at some point and it could just as easily wipe your home directory at that point instead.

    • rah@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      You have the option of piping it into a file instead, inspecting that file for yourself and then running it, or running it in some sandboxed environment.

      That’s not what projects recommend though. Many recommend piping the output of an HTTP transfer over the public Internet directly into a shell interpreter. Even just

      curl https://... > install.sh; sh install.sh
      

      would be one step up. The absolute minimum recommendation IMHO should be

      curl https://... > install.sh; less install.sh; sh install.sh
      

      but this is still problematic.

      Ultimately, installing software is a labourious process which requires care, attention and the informed use of GPG. It shouldn’t be simplified for convenience.

      Also, FYI, the word “option” implies that I’m somehow restricted to a limited set of options in how I can use my GNU/Linux computer which is not the case.

      • gaylord_fartmaster@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 month ago

        Showing people that are running curl piped to bash the script they are about to run doesn’t really accomplish anything. If they can read bash and want to review the script then they can by just opening the URL, and the people that aren’t doing that don’t care what’s in the script, so why waste their time with it?

        Do you think most users installing software from the AUR are actually reading the pkgbuilds? I’d guess it’s a pretty small percentage that do.

        • rah@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 month ago

          Showing people that are running curl piped to bash the script they are about to run doesn’t really accomplish anything. If they can read bash and want to review the script then they can by just opening the URL

          What it accomplishes is providing the instructions (i.e. an easily copy-and-pastable terminal command) for people to do exactly that.

          • gaylord_fartmaster@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            1 month ago

            If you can’t review a bash script before running it without having an unnecessarily complex one-liner provided to you to do so, then it doesn’t matter because you aren’t going to be able to adequately review a bash script anyway.

            • rah@feddit.uk
              link
              fedilink
              English
              arrow-up
              0
              ·
              1 month ago

              If you can’t review a bash script before running it without having an unnecessarily complex one-liner provided to you

              Providing an easily copy-and-pastable one-liner does not imply that the reader could not themselves write such a one-liner.

              Having the capacity to write one’s own commands doesn’t imply that there is no value in having a command provided.

              unnecessarily complex

              LOL

              • gaylord_fartmaster@lemmy.world
                link
                fedilink
                arrow-up
                0
                ·
                1 month ago

                I don’t think you realize that if your goal is to have a simple install method anyone can use, even redirecting the output to install.sh like in your examples is enough added complexity to make it not work in some cases. Again, those are not made for people that know bash.

                • rah@feddit.uk
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  arrow-down
                  1
                  ·
                  edit-2
                  1 month ago

                  even redirecting the output to install.sh like in your examples is enough added complexity to make it not work in some cases

                  You can’t have an install method that works in all cases.

                  if your goal is to have a simple install method anyone can use

                  Similarly, you can’t have an install method anyone can use.