Re: hook into rpm install/update/deletion of any package (for etckeeper)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon May 19 2008, Todd Zullinger wrote:
> Till Maas wrote:
> > Thank you, but this way I fear that I install unsigned rpms from a
> > repository because my locally built rpms are not signed (otherwise
> > they are broken, because rpms does not support the keylength of my
> > gpg key) and therefore afaik I had to disable the check for gpg
> > signatures.
>
> So no signature is preferable to creating a key of more standard size
> for use in signing your custom packages?

I can still provide gpg signatures with gpg:
gpg --armor --detach-sign foo.rpm
This also allows the receipient to check the signature without giving my key 
ultimate trust for any rpm, which is afaik what happens when someone imports 
a gpg key into rpm. Also do not distribute rpms via unsecure channels to my 
machines and having a third private gpg key for this without gaining much.

Regards,
Till

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux