1 |
On Sun, Nov 07, 2004 at 03:45:21PM +0000, Rui Covelo wrote: |
2 |
> | > (1) the server has not been compromised |
3 |
> | |
4 |
> | How do I very this? Is there a list of SHA1 hashes of all |
5 |
> | files /usr/portage is supposed to contain? |
6 |
> |
7 |
> Where would you store that list? In a trusted server? Would you trust |
8 |
> the server admin of that server? |
9 |
|
10 |
The point is not to eliminate the need to trust some entity. The point |
11 |
is to have to worry about the integrity of as few entities as possible. |
12 |
|
13 |
A single vulnerability is better than multiple vulnerabilities. |
14 |
|
15 |
> | > IMO the purely technical issues have been solved mostly. |
16 |
> | > However, those are smallest and least important part. |
17 |
> | |
18 |
> | So how long will it (approximately) take until this problem |
19 |
> | is fixed? |
20 |
> |
21 |
> Well... I guess until someone comes up with a solution! Not the problem! |
22 |
> The problem is already known. |
23 |
|
24 |
So is the solution. It was posted a few messages back. We just need some |
25 |
admin to drop a find script on the main server and setup the required |
26 |
keys. Once the signatures are there, anyone can write the userland script |
27 |
to do the verification, but until then, there's no point to write it since |
28 |
the server implementation is not known. |
29 |
|
30 |
- Chris |
31 |
|
32 |
|
33 |
-- |
34 |
gentoo-security@g.o mailing list |