[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: Should Fedora rpms be signed?

On Thu, 2004-10-28 at 14:34 +0200, nodata wrote:

> Yes, but that's not really the point.
> The point is that the RPMs are not signed.
> It's not really important how it came to be noticed that the RPMs were not
> signed (i.e. the announcement about the recent scam)
> It's not really relevant either than RPMs can verify themselves.
> The whole point of my post was that there is no way to verify a rawhide
> RPM originated from Red Hat.
> True, signing them would devalue the signing key, but NOT signing them
> devalues the RPMs even more because they cannot be automatically verified
> using a package manager.

The question is still one of gains versus losses.  I personally think we
gain more by _not_ signing them.  If we automatically sign them, we make
it more convenient for people who don't want to use --nosig or whatnot
on rawhide packages.

That's not a win.  In fact, it's a big loss.  If the packages are
automatically signed during the build process, the only thing the
signature means is "it showed up in the queue of things to be signed".
But if you see a signed package, the impression you get is that it is in
some way "trusted".  Of course, it isn't trusted.  It's just got a
signature that says "don't make the user type --nosig".

If you _really_ want a way around that, change the update tools so you
can mark a repo as being allowed to have unsigned packages.

If the problem you're trying to avoid is corruption or injection attacks
on a repo, signing the packages still isn't the right answer -- sign the
metadata on the repo, and then compare the packages to that, instead.
Then there's no misplaced trust on the package, as you'd get by signing
it, but there is verification that it is the right package.


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]