Re: Secure network installs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2002-07-21 at 21:03, Matthew Miller wrote:
> On Mon, Jul 22, 2002 at 06:30:15AM +0800, John Morris wrote:
> > If you're ultra-paranoid, it's conceivable that someone upstream of the
> > remote location could hijack the install, substituting the install images
> > and RPMs (are the digital signatures even checked by the installer?).  Might
> > take quite a lot of work, but it's doable.  Am I really that paranoid?  :)
> 
> I think having the installer check the signatures would be a better answer
> to the paranoia, yeah?

Give me a way to securely get an arbitrary number of GPG keys and assign
trust values to them and then maybe we can come back to the checking GPG
signatures during the install.  Until then, it's a moot point because I
either have to take the up2date route (embed the Red Hat GPG-KEY in the
installer sources, then you can't customize a package list without
rebuilding the installer or there's something like having
RHupdates/GPG-KEY but that doesn't address trust concerns at all) or ask
you for a GPG key on a floppy, which is kind of crappy for a) kickstart
and b) all the people without floppies.

Cheers,

Jeremy





[Index of Archives]     [Kickstart]     [Fedora Users]     [Fedora Legacy List]     [Fedora Maintainers]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]
  Powered by Linux