Re: warning to list

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le jeudi 28 octobre 2004 à 15:39 -0300, Alexandre Oliva a écrit :
> (snip)
> On Oct 26, 2004, Matias Féliciano <feliciano.matias@xxxxxxx> wrote:
> > If the build system (or whatever it is) is cracked, the passphrase can
> > be snipped. In all case signing require a secure system !
> 
> Yup.  That's why the less widely available the signing key is, the
> better.  If all machines in the build system had access to it, the
> signature would be worth very little.

Still better than nothing.

>   If only one single, very secure
> machine does, the signature is far more reliable, and hopefully you
> won't have to revoke the key as often as in the previous case.

As often as the server is insecure.
Do you mean the build server is a total disaster about security ?
If it's the case, why should I even trust unsigned rpm ?
Your point don't make any sense.
It's up to me to set the owner trust value of the key. And "Marginally
trusted" still better than nothing.
Just curious, How many time the build system have been cracked ?
Once per week, once per year, or once per decade ?

> 
> > Yes. But automated signing is better than nothing.
> 
> Not necessarily.  If the key is compromised as often as it could with
> a badly-implemented fully-automated signing process, you'd get to
> update your key ring daily.  How convenient would that be?

Come on....
Stop turning around.
All you say is "if ..., if ..., if ...".
Should I continue to flame with other "if ..." ?
With unsigned rpm, no "if ..." is needed. I can definitely not trust rpm
package. Period.

> 
> > Manual signing or not, I don't care. Seems Red Hat try to push
> > people to RHEL BETA (ok, sound like FUD).
> 
> It definitely is FUD :-)

Well, I do my best :-)

> 
> You're sure welcome to test both :-)
> 
> > What append if the build server is cracked ?
> > Nothing. It's like having none signed rpm (like the current practise).
> 
> Not quite.  People would still trust the old key

Come on...
Right now people are "forced" to _always_ trust unsigned package. The
current situation is worse than "one day, some people wrongly trust a
key".
I am "forced" to add "gpgcheck=0" to yum. this mean i trust these
unsigned packages (even if the packages are already signed with an
revoked key:-)).
Do you think it's a good security practise ?


>  until they find out

A new argument. The "if ... until ...".

> about the revocation and, by then, it might be too late.

With unsigned rpm, if any single mirror is corrupted it's already too
late to do whatever.
Sorry for this "if" argument.

>   Not to
> mention again the need for obtaining new keys whenever this happens.
> 

gpg --gen-key 
gpg --export --armor key > PUBKEY
ftp ... "put PUBKEY".
Anyway. we will be back temporally to unsigned rpm. No more.

> > What damage this will cause the Red Hat business ?
> 
> Having keys revoked and new ones issued would definitely look bad.

I have a revocation certificate for my key. Should I stop using gpg
because *perhaps* I will need to use it ?
This doesn't make any sense.

>  If
> one can't trust the automated build key, why would any of the others
> be trusted?  Even if there's a web page explaining why you shouldn't
> trust the automated build key, how many people would jump to incorrect
> conclusions on Slashdot before getting the facts?

if, if...
Right now I can *not* trust rawhide rpm.
Suppose my mirror (or http://mirrors.kernel.org/) is cracked then
Slashdot will be happy to point that Red Hat don't sign their package
even if the build system is not cracked.
The reputation of Red Hat rely on _all_ mirrors if packages are not
signed.
If the build system is cracked and Red Hat don't use signed rpm do you
think it's better for the reputation of Red Hat ?

> 
> > Why Red Hat are afraid about signing Rawhide packages ?
> 
> We're not.  They're signed quite often.  Whenever one of the key
> holders happens to feel like signing packages.
> 
> > As long as the secret key is ... secret, automated (or not) signed rpm
> > is better than nothing.
> 
> The trick here is: how to get the signatures automated without
> further exposing the key?
> 

Do what you can.
If the key is cracked in 2 mouths I'll enjoy using signed package during
2 mouths. Still better than nothing.

Here is the point. Currently Red Hat does not *want* to do any thing for
the security.
It is the decision of Red Hat (btw, Slashdot will be happy to know
this). All these "pseudo technical" arguments are not relevant.

Attachment: signature.asc
Description: Ceci est une partie de message =?ISO-8859-1?Q?num=E9riquement?= =?ISO-8859-1?Q?_sign=E9e?=


[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]