Files modified after download -> that said the system is compromise. In this case, the detection is very hard because you want signing with the compromise operating system.
-- Julien On Sun, Apr 6, 2008, Bernd Eckenfels <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTECTED]> you wrote: > > I trust the archive maintainers and have a secure way to get a copy of > > their public key. I don't trust individual developers and cannot have > > all of their keys securely distributed to me. > > Yes, you would have to sign the packages with your own key after verifying > the release file. If you are talking about automating the verification process, that wouldn't quite work. The system that downloads the packages might have been compromised. The files that I would sign on that system might have been already modified at the time when I sign them. So I don't see how signing the packages with my own key could help here. Am I missing something? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

