slackware iso's

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/01/03  5:30 PM -0600, Gregory Nowak wrote:
> I used the gpg method you describe below. However, it occurred to me
> that there is nothing stopping someone from potentially cracking an
> ftp server, and changing the iso image, while leaving the asc file
> intact. So, doing gpg --verify <ascfilename> would still tell you the
> signature is correct, even though the iso(s) had been messed with.

The signature file is verified against the iso. If you didn't have it in
the same directory or if it was corrupted the signature wouldn't verify.

> Am I missing something here, or is this train of thought actually
> correct. If this train of thought is correct, then what's the point of
> the .asc file, other then to give an unsuspecting user a false sense
> of security?

I suppose it is possible that someone could generate a new key with a
userid of security at slackware.com, but you would probably hear about
something like that from other sources.

- -- 
Unix is a user friendly operating system. It just picks its friends more
carefully than others.
Thomas Stivers	e-mail: stivers_t at tomass.dyndns.org	gpg: 45CBBABD
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/zG+Q5JK61UXLur0RApkTAJ9IsDX8l2sHmlBD0qVqXdS1y/9WFgCeLjaY
f10hopMOWpo7JmVYdbAICRg=
=dGsW
-----END PGP SIGNATURE-----




[Index of Archives]     [Linux for the Blind]     [Fedora Discussioin]     [Linux Kernel]     [Yosemite News]     [Big List of Linux Books]
  Powered by Linux