Re: Harassment by David Runge

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Am 13.05.19 um 13:53 schrieb Justin Capella via arch-general:
...
> I recognize base64
> but RWSUBDizLm/GKcGyJf84aGAXKuZLjXNJrUezGuLaqd89R+rQmlFz/L42V8xe78eOx7kyXAJ3rPF30MUQpBayUSkof3KQxE35CA0=
> in the sig file associated with liblzf... But it's useless to me without
> the extraneous tool I'm not installing. Seeing as git signs with gpg I
> think it's fair to say that's the norm.
> 

...

The tool he uses is called signify, which is the
"OpenBSD tool to signs and verify signatures on files"

It is packaged in community. I have no opinion on the use of such
signatures in a Linux environment. He has also linked to the signature
and the verification process (see quote below). Theoretically it would
be possible to verify the signatures in a prepare() function, but it
does feel a bit more complicated than directly using a gpg signature.

Signify is the result of a desire to have a signature tool that can be
audited easily, OpenBSD claims gpg implementations are too complicated
for that. [*]

--
ProgAndy

[*] https://www.openbsd.org/papers/bsdcan-signify.html


> On Sat, May 11, 2019, 9:20 AM Marc Lehmann via arch-general <
> arch-general@xxxxxxxxxxxxx> wrote:
> 
>> A few of my packages are distributed on http://dist.schmorp.de/, backed up
>> by signify signaturs, in turn backed up by gpg(1), and other means.
>>

...

> 
> (1) http://dist.schmorp.de/signing-key.txt



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux