Re: Time to resurrect multi-key signatures in RPM?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bill Crawford <billcrawford1970 <at> gmail.com> writes:

> What might be good, is only signing packages with one or two keys, but
> only allowing those keys' public parts to be updated in rpm database
> (or wherever) if signed by a much larger number of keys, which would
> be owned by some trusted people from the fedora project. Then
> automated rollover could be done by simply providing a new "keyring"
> in updates.

Exactly. Imagine if yum trusted fedora-release package signed by 5 keys of
signatories from the pool. This could have been delivered immediately upon
(potential) compromise, which would mean:

- seamless transition to new Fedora key without ever trusting the old key
- automatic delivery of revocation certificate for the old key
- instant suitability of all packages to be resigned by the new key

So, not only would attackers be unable to subvert the packages by stealing
Fedora key (because they'd need other signatories to agree to sign bad
packages), but any (potential) compromise would be quickly dealt with.

--
Bojan

-- 
fedora-devel-list mailing list
fedora-devel-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-devel-list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux