Re: Secrecy and user trust

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ed Greshko wrote:
Ed Greshko wrote:
It would be very nice if someone would fully define what they mean by
the very vague term "fake key".


In this context it would one that a user would install that was not the one officially created for the packages in the fedora repository.

And along with that, define the method used to distribute said key in a
manner that would be oblivious to the all end users.

It doesn't have to fool all the end users, just you. Or someone with content worth stealing, or on a network worth penetrating.

It has to be
oblivious to all end users such that nobody would be able to raise an
alarm in a reasonable amount of time.

What's a reasonable amount of time? A victim would notice if/when they manage to get an official RPM that the key doesn't match (unless their subverted packages remove the check) and might or might not do something besides import the correct key.

If the public/private key methods employed today are as easy to
penetrate and subvert as some seem to be claiming then one has to
question why  it hasn't already been done.

It's not easy to fool everyone. The question is whether there is a way to start from scratch so you can't fool anyone.

--
  Les Mikesell
   lesmikesell@xxxxxxxxx

--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux