trusting downloaded code (was: [vox-tech] Installing Java)
Rick Moen
rick at linuxmafia.com
Thu Dec 30 11:34:12 PST 2004
Quoting Henry House (hajhouse at houseag.com):
> I've occasionally speculated that it would be really useful for
> distributions to provide a package containing all the public keys used by
> upstram maintainers (e.g., kernel.org) to sign releases. There is no
> guarantee that when I download Foo Group GmBH's latest tarball and PGP key
> from their FTP server, then verify the former against the latter, that I
> have not downloaded a compromised tarball AND conpromised PGP key. Thoughts?
I suppose that would be useful.
Debian, for example, could have package "upstream-keyring" to go along
with their "debian-keyring" package that furnishes the gpg keys of all
registered Debian developers.
At the same time, they may see maintaining such a package (checking
continually for revocations and compromises, etc.) as not their problem.
Dunno.
A more _standard_ (extant and functional) way you verify that a PGP/gpg
key is valid is via signatures in that key (and absence of a revocation
certificates) in the worldwide web of trust. Obviously, you would not
_ever_ want to trust an upstream package _merely_ because it was
accompanied by either J. Random PGP/gpg key or an MD5 sum, as any halfway
competent intruder would fake those, too.
More information about the vox-tech
mailing list