chavez243ca said:
That's kind of what I figured - so if the port maintainer accepts the source as pure and just fingerprints it, the port will be tainted and we would be none-the-wiser.
I think there is sometimes the perception that building from source is more secure than going the binary route.
Thanks for your input.
Not sure what you mean by "going the binary route". The binary packages you install with pkg_add are built from the same source code "accepted" by the maintainer. So going with packages is neither more nor less secure than building the ports.
If you mean that we should be downloading some binaries built and blessed by the upstream authors, you're probably unaware that this would mean sacrificing most of the 22,000+ things in the FreeBSD ports/packages system -- because most of those upstream authors are focused exclusively on Linux.
The port maintainers do work with sources obtained as directly as possible from those upstream authors, and our checksums ensure that those sources haven't been surreptitiously replaced when you download the distfile
(usually from the same place where the maintainer got it). So in all but the most unusual cases, when a third-party app or library is running on FreeBSD, it's no less secure than it would be on Linux. Those RPMs were built from that same sourcecode too!
(I'll leave aside the question of whether it might be
more secure on FreeBSD because the underlying OS is.)
The real issue here is where you are getting your source tarballs, packages, RPM's or whatnot. If you're not downloading them from the original author's site or a reputable repository (which includes the freebsd.org servers!), you're asking for trouble.
But yeah, if the source code is compromised even on the original author's site, there's nothing in the ports or packages system that will detect it. As Warren says, portaudit can only tell you about it after the exploit becomes known.
Instead of looking to the ports/packages for remedies, perhaps you should be asking whether FreeBSD's jails provide the best protection against this kind of exploit?