On Fri, 17 Jun 2016 at 15:19 Yui Hirasawa <y...@cock.li> wrote:

> >>> Like already said before, detecting if a user run a curl-pipe-bash and
> >>> injecting a malicious binary on the fly is rather trivial to do
> compared
> >>> to compromise the nixos website itself, and create a phising to fake
> >>> both the tarball and the displayed hash.
> >>
> >> Hash would only ensure that there is no corruption en route, but we
> >> already have that since most TLS ciphersuites are authenticated... gotta
> >> check nixos.org ciphersuites.
> >
> > I wonder if something like this would be better perceived:
> > ...
>
> No. Just verifying a hash isn't good enough. Instead the script should
> come with a detached PGP signature.
>

The second argument could alternatively be a GPG fingerprint then. It
wouldn't protect the user from a downgrade attack though.

Did you reply to me out of the list on purpose?
>

Not on purpose. I believe it went both to you and the list though.
_______________________________________________
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev

Reply via email to