Crates.io | arch-audit-gtk |
lib.rs | arch-audit-gtk |
version | 0.3.1 |
source | src |
created_at | 2021-03-13 00:22:09.628722 |
updated_at | 2021-11-04 12:03:00.682204 |
description | Arch Linux Security Update Notifications |
homepage | |
repository | https://github.com/kpcyrd/arch-audit-gtk |
max_upload_size | |
id | 368038 |
size | 128,952 |
Show an indicator if there are any security updates missing for your Arch Linux system.
pacman -S arch-audit-gtk
The package contains files for xdg-autostart, so it should automatically start the next time you log in. This is the case for gnome and kde, for i3 you need something like dex -a
or execute arch-audit-gtk
directly.
For gnome3 you need to install an extension for app indicator support:
pacman -S gnome-shell-extension-appindicator
After installing this extension you need to restart your desktop so gnome picks it up, you then need to enable the extension with the gnome extension manager.
There are currently 3 themes that you may pick from:
default
nocolor
classic
You can set this by creating a config file at one of the following locations:
/etc/arch-audit/gui.toml
~/.config/arch-audit/gui.toml
With the following content:
[design]
icon_theme = "nocolor"
You can also select a theme using the --icon-theme <theme>
commandline option.
Since this program is automatically pinging security.archlinux.org
we attempt to use multiple techniques to increase privacy:
You can configure arch-audit to connect through Tor or any other socks5 proxy. There are two advantages in doing this:
security.archlinux.org
can't tell you apart from other arch-audit users using Tor.security.archlinux.org
, also they can't interrupt that specific connection. They may be able to tell that you're connecting to Tor and may be able to interrupt your Tor connections though.Configure arch-audit like this:
mkdir -vp ~/.config/arch-audit
cat > ~/.config/arch-audit/settings.toml <<EOF
[network]
proxy = "socks5://127.0.0.1:9050"
EOF
Even if the ip address is hidden, with a fixed update interval you'd need a very large set of people to make this reasonably anonymous. Instead we use a very large jitter and vary the update checks between 2-6h. Since this makes it virtually impossible to predict the next update check the server/network can't tell if a specific user is still there or went offline since the last check.
The complete list of conditions that cause a connection to security.archlinux.org
:
pacman -S git rust arch-audit
git clone https://github.com/kpcyrd/arch-audit-gtk
cd arch-audit-gtk
cargo run
GPLv3+