On Wed, Nov 1, 2017 at 3:31 PM Przemek Klosowski
<przemek.klosow...@nist.gov> wrote:
>
> On 11/01/2017 03:14 PM, Kevin Fenzi wrote:
> > The only attack vector I can see is tricking someone into installing a
> > package from an EOL release with a known vulnerablity, but if you can do
> > that you likely can get them to just download it and install it or
>
> Is it possible to compromise an old key, and use it to sign new malware
> that looks like it is from a recent distribution? I understand that it's
> unlikely because private keys are protected equally well regardless
> whether they are old or new, but maybe there's some way that makes older
> keys more vulnerable?

Given the way sigul stores the private keys no. No one actually has
access to the password for the private key if you could manage to
extract the key. The biggest threat would be someone managing to
recreate an old key. Even then, the biggest risk is long lived
machines, as new installs never import the old keys by default. That
does not mean someone couldn't just import all the old keys into their
system.  Prior to Fedora moving to Sigul there was a shared key and
passphrase for signing the rpms, sigula manages all acecss to the keys
today

Dennis
-- 
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to