On Wed, Oct 12, 2011 at 7:01 PM, drago01 <drag...@gmail.com> wrote:
> On Wed, Oct 12, 2011 at 7:53 PM, Adam Williamson <awill...@redhat.com> wrote:
>> On Wed, 2011-10-12 at 13:45 -0400, Simo Sorce wrote:
>>
>>> I have no problem with changing the password, but leave my ssh keys
>>> alone, unless there is a real reason to ask people to change them.
>>
>> Reading between the lines of recent attacks, it seems likely that
>> private keys compromised in some of the attacks were used to perform
>> others. (No-one's come out and officially said this yet but it seems
>> pretty obvious from the subtext of some of the reports; I'm thinking
>> kernel.org / linux.com, for e.g.) It doesn't seem at all unlikely that
>> some people may have used the same identities on some of the other
>> compromised systems as they are using on FAS, and hence it seems pretty
>> reasonable to require this change.
>
> Not really unless there is any evidence pointing towards that
> direction it is just paranoia.
> Given the number of FAS account you can pretty much always assume that
> some account may be compromised but that's not enough to warrant any
> action. By that logic we should be changing keys daily ....

And people are complaining about the fact that the last time it
happened was 3 years ago. At work I have to do it every 60 days.

Peter
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to