Re: Packages Verified with MD5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 01/12/2014 01:13 PM, Taylor Hornby wrote:
> Thank you, that makes so much more sense!
> 
> So, really, the vulnerability only exists while the Arch dev (or
> package maintainer or whatever they're called) is building the
> package. Once they do, and sign it, all Arch users will verify their
> signature to make sure they get the same file the Arch dev created.

That's correct! See these pages for more info on how pacman's signature
checking works:

<https://wiki.archlinux.org/index.php/Pacman#Package_security>
<https://wiki.archlinux.org/index.php/Pacman-key>

> That's not so bad, then, since you can't really do any better unless
> the upstream source (Mozilla) signs their files, and the package
> maintainer has their public key.

To be honest, I'm a little surprised that Mozilla doesn't sign their
Firefox source code.

Kyle

Attachment: signature.asc
Description: OpenPGP digital signature


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux