Re: script to import keys

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Apr 20, 2004 at 08:42:09AM -0400, Jay Daniels wrote:
> A simple script to import keys.
> 
> $ cat import-keys.sh
> #!/bin/sh
>  
> if [ $UID != 0 ]; then
>  echo Error: become root before starting $0 >&2
>  exit 100
> fi
> 
> rpm --import http://fedora.redhat.com/about/security/30C9ECF8.txt
> rpm --import http://www.fedora.us/FEDORA-GPG-KEY
> rpm --import http://freshrpms.net/packages/RPM-GPG-KEY.txt
> rpm --import http://dag.wieers.com/packages/RPM-GPG-KEY.dag.txt
> rpm --import http://atrpms.physik.fu-berlin.de/RPM-GPG-KEY.atrpms
> rpm --import http://newrpms.sunsite.dk/gpg-pubkey-newrpms.txt
> rpm --import http://www.jpackage.org/jpackage.asc
>  
> exit 0
> #EOF
> 
> Are there any more major repositories that could be added?

It depends on what you conder major, I guess ;)
But here are some more:

http://ccrma.stanford.edu/planetccrma/apt/configuration/all/RPM-GPG-KEY.planetccrma.txt
http://apt.bea.ki.se/biorpms/RPM-GPG-KEY.biorpms

They can be found under /usr/share/atrpms, iff you have atrpms
installed. The script is sometimes use is:

  for key in \
    gpg-pubkey-db42a60e-37ea5438,RPM-GPG-KEY.redhat \
    gpg-pubkey-66534c2b-3e60b428,RPM-GPG-KEY.atrpms \
    gpg-pubkey-e42d547b-3960bdf1,RPM-GPG-KEY.freshrpms \
    gpg-pubkey-b8693f2c-3f48c249,RPM-GPG-KEY.newrpms \
    gpg-pubkey-6b8d79e6-3f49313d,RPM-GPG-KEY.dag \
    gpg-pubkey-bbf04688-4018dbeb,RPM-GPG-KEY.biorpms \
    gpg-pubkey-68d9802a-406db022,RPM-GPG-KEY.ccrma \
    gpg-pubkey-4f2a6fd2-3f9d9d3b,RPM-GPG-KEY.redhat-fedora \
  ; do
    :
    rpm -e --allmatches `echo $key | awk -F, '{print $1}'` > /dev/null 2>&1 || :
    rpm --import /usr/share/atrpms/`echo $key | awk -F, '{print $2}'`
  done

It was even part of atrpms %post scriptlet, but there were rumors of
rpm corrution if using rpm --import within rpm scripts, so I disabled
it.

> Is there any way to use rpm to check if the key is already imported?
> Perhaps an IF statement by checking the key id with gpg, 0x1CDDBCA9 or
> some way to validate the key matches the certain key id's.

See above, just throw all copies of the same key out before installing
them, so you can be sure to only have one copy.

> Importing from a keyserver may be more secure than importing from
> a URL?

No, not really, anyone could place a key onto a keyserver. and to be
honest, as long as there is no web of trust (and there is none), the
whole gpg signing is faking security feeling.

Or do you really know that the keys/ids above belong to the repos? How
do you know that w/o a chain of trust?

But it's OK to have packagers used to signing, so we get the web of
trust in a couple of years ;)

> Since the file checksum is checked anyway, is gpg even neccessary?

gpg is also telling you something about the key owner, i.e. you know
that the package was signed by someone with that key id, and that
signatures cannot be easily tampered with, so the package has still
the state of the signing time.

So, if you were to trust that id, you could trust the contents. But
see above about the non-existing trust mechanisms (which is a general
problem with crypto signing, it is not restricted to rpm or package
signing).
-- 
Axel.Thimm at ATrpms.net

Attachment: pgp1mFYuFIjEW.pgp
Description: PGP signature


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux