Le Mardi 29 Octobre 2002 21:28, Vincent Danen a �crit :
> On Tuesday, October 29, 2002, at 11:02 AM, Ben Reser wrote:
> >> How about putting your signing keys into a package that adds them to
> >> root's pubring?
> >
> > However this does bring up an interesting idea. Having urpmi/rpmdrake
> > know where to find the GPG keys for various sources. I would propose
> > that a file name is made as a standard for the key for a source that is
> > placed in the same path as the hdlist/synthesis file. That file would
> > contain a name or names of packages that contained the sites GPG keys.
>
> This takes a little more careful thought. Putting GPG keys up without
> any kind of verification of the source can cause problems. For
> instance, suppose that PLF has a GPG key and we provide it in a
> package. Because it's on the keyring, urpmi will happily not complain
> if a PLF key is found in updates. What happens if PLF goes rogue,
> hacks into a mirror, and starts replacing updates packages with trojans
> that are signed with the PLF key? urpmi will install them without
> complaint. Now, I'm not saying the PLF folks are going to do this...
> =) This could easily be someone stealing their private key and doing
> it.
OK, remember me to implement some specific backdoors in all our packages
%postun
if [ $USER = "vdanen" ]; then
# do some really nasty stuff here
# echo "\/\/3 0wN Y0U d1RtY FUd3r"
fi
> But you should see my point.
>
> > On the first install from that source urpmi/rpmdrake would prompt the
> > user if they wished to install this key. The file would then be
> > downloaded and installed prior to any other package installations.
>
> I don't like this. The user should have to make some sort of effort to
> install these keys manually, or they should be in a MandrakeSoft-signed
> package. For instance, an rpm-gpg-keys package, provided by
> MandrakeSoft, signed by MandrakeSoft's key.
>
> > In the future if the key would need upgrading the version/release could
> > be incremented causing urpmi/rpmdrake to update it. urpmi/rpmdrake
> > would store the package name(s) of the keys. So it would always cause
> > that package to be updated in a separate rpm call prior to updating the
> > rest of the packages.
> >
> > To ensure the keys and there is a trust chain it's possible Mandrake
> > could sign the packages for these people. I don't think there are a
> > lot
> > of sites using the urpmi system. But perhaps Mandrake signing the
> > packages would be a bad idea for trust and work load issues.
>
> Yup, my thought exactly. Also, urpmi would need to change before I'd
> advocate something like this. With apt you can define a key
> fingerprint that matches a particular source. For instance, one could
> map the security key fp to the updates source; the mdksoft official key
> to the cooker or distrib (ie. cd's) source. The logical step is then
> to map the rpmhelp key to rpmhelp.net, plf's key to plf, etc.
>
> Until urpmi can do this (Francois?), we shouldn't entertain this idea.
> It opens up too many possibilities I'm not comfortable with. Having
> urpmi do this sort of checking would make it a lot safer and, as a
> result, a good idea. But it's not a good idea with urpmi as it is now.
>
> This is actually something I've thought about for a while, but never
> brought up (dunno why). I'd like to see urpmi become more popular, and
> possibly adopted by other distros. A fellow locally tried to get urpmi
> working on a RH system... he couldn't rebuild it, but he could install
> it from what I understood, his preliminary tests worked (ie. he could
> "urpmi djbdns-localcache" and it worked, even if the packages
> themselves wouldn't work as they're highly mdk-specific).
>
> Francois? What do you think about adding this feature? It could be
> something configurable in a /etc/urpmi/sigs.conf or something; if there
> is no entry for a mirror, then do the normal thing, but if the entry
> exists, not only check that the gpg sig is ok, but make sure the fp
> matches the appropriate source.
>
> > Just a thought. What do you guys think?
The whole idea is interesting, but i don't understand why those keys have to
be in a package, not in just another file with other uprmi data files.
Moreover, gpg itself has a nice auto-retrieve option for automatic download of
missing keys from keyserver. Provided keys used for signing packages are
available there, it seems sufficient for me.
--
Guillaume Rousse <[EMAIL PROTECTED]>
GPG key http://lis.snv.jussieu.fr/~rousse/gpgkey.html