On 09/16/2014 02:19 PM, Bert Massop wrote:
> On Tue, Sep 16, 2014 at 5:42 AM, Steve Dougherty <st...@asksteved.com>
> wrote:
> 
>> The trusted key IDs are updated if the channel definition is signed with
>> enough valid signatures under the existing definition. This means
>> everything on a channel - not just the files like freenet.jar - require
>> signatures.
>>
> 
> The update channel idea sounds great in general. I do see one major problem
> with the a above, though.
> 
> Consider a rather old update channel (USK@…/…/100). Now suppose the update
> channel is so old that edition 0 has fallen out of Freenet (which will
> obviously happen, given the nature of Freenet). A new client subscribes to
> the update channel (for obvious reasons, this will be USK@…/…/0) — what
> happens? The new client now has no way of verifying that the definition
> file has not been tampered with since the last trusted edition (i.e.
> edition 0). In fact, this problem arises if *any* single previous edition

How so? If the channel definition's signing requirements have not
changed since the definition the channel was added with - namely the
first one given edition 0 - the fetchable definition / update edition
can still be verified.

> becomes unretrievable for any reason: the chain is broken and authenticity
> can no longer be verified.

This is true if the definition of the fetchable edition(s) contains
different signing requirements and does not pass verification by the
starting (seed? initial?) definition. Release managers will need to
distribute updated channel definitions when signing requirements change
for that reason.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to