On Sun, May 01, 2011 at 11:23:40PM +0000, Duncan wrote:
> What about having a dedicated server-based changlog-signing key?  That's 
> still a lot of signing with a single key, but as you observed, the hazards 
> of a loss of integrity there aren't as high as with most of the tree 
> content.  It'd require changes, but I don't believe they're out of line 
> with that required for the rest of the proposal.

It means the only real trust that clients can level is on that key- 
since it will be the last signer (thus /the/ signer) across all pkgs.

Get at that key, and you've got the tree, versus the current form, 
crack all signing keys and you've got the tree.

Mind you this is ignoring eclasses, but getting eclasses sorted will 
be mildly pointless if the rest of the solution has been 
weakened/gutted since.

Point is, it's not *just* about having a signature on it- it's about 
mapping the trust of that signature back, and sectioning/containing 
compromises.  What y'all are suggesting guts that layered defense.
~brian

Attachment: pgpjF9q9h6E0S.pgp
Description: PGP signature

Reply via email to