[Yum] gpg public keys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> Is there any way to fully encapsulate gpg keychecking?  As in, have yum
> always check gpg signatures and never tell you about it unless they fail
> to match?  Or is there something chicken-and-eggish about this...

Chicken-and-eggish.

1. you don't know which keys to trust
2. you don't know where to get the keys necessarily
3. you never know what whack stuff get installed.


> Forgive me if it already does this.
> 
> As for output in yum list, a column with Y/N/NA in it for yes, gpg key
> checks, no it fails, or not applicable, no key available might be a
> decent option to have, as might a flag to tell it to list only packages
> whose key is n,na, or just n.  Those commands might play a useful role
> in a security audit or a what's wrote with this damn system audit,
> presuming of course that one can trust yum itself on a compromised
> system.
> 

Can't happen if you look at anaconda.

Anaconda can't check gpg sigs b/c it would have to know who to ask for
the keys, and it can't really do that. Additionally, we'd have to trust
all the pkgs already installed b/c afaict there is no way to check the
gpg sig of a package that is installed.

Right now with rpm 4.2 gpg key importing is trivial.

absolutely trivial. 

So there is little excuse for not grabbing a key and using it.

even if yum doesn't implement 'yum importkey' it's still a trivial
operation - literally one command with rpm.

-sv




[Index of Archives]     [Fedora Users]     [Fedora Legacy List]     [Fedora Maintainers]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]

  Powered by Linux