Re: Fedora's way forward

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2006-04-02 at 08:32 +0530, Rahul Sundaram wrote:
> As I understand it what the OP claimed was that a exploited browser
> would automatically be able to install packages silently which is
> something SELinux should be able to prevent with appropriate policies in
> place. Making it easier for users to install packages is not a security
> issue at all as long as the privileges required to complete the
> operation doesnt change arbitrarily. 

The way to deal with this is to check GPG keys. Don't install a package
unless the key checks out.

This leads to a chicken and egg problem. The GPG keys is typically
installed by the repo release file. How do you get the repo RPM
installed? Put up a big fat warning before installing RPMs with
untrusted signatures? This is kind of like what windows does these
days...

Or just sign third party repo's keys with the Fedora key. I don't know
what Red Hat legal would think of that though.

Or just not install repos with an RPM. Do something special.

(Just some brainstorming)

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux