On Thursday 06 December 2007 05:52:46 Hannah Schroeter wrote: > Hi! > > On Wed, Dec 05, 2007 at 06:46:15PM -0500, STeve Andre' wrote: > >[...] > > > >You know, you're descending into a recursive loop of "if, if, if..." and > >it never ends. OF COURSE if someone breaks into the site they could > >do things--once you've lost control of your site all bets are off. I dare > >say that someone breaking into a site might find all the appropriate > >tools to re-sign things, too, and do the spoof that way. > > If I released code with cryptographic signatures, I'd not leave a secret > key file, nor a passphrase on the servers with the master web/ftp > site. I'd sign on a box you can't access from the master site (nor > the mirrors). So, no, the attacker would *not* gain access to signing > tools (ok, yes, the tools, perhaps, like gpg or openssl, but not the > key material). > > >--STeve Andre' > > Kind regards, > > Hannah.
Heh--you're intelligent. But I know of two places where everything was stored on the one machine, and I think one of those sites still hasn't gotten it through their heads that this isn't a good idea. --STeve Andre'