Adam Jackson wrote:
> On Thu, 2013-01-10 at 17:56 +0100, Till Maas wrote:
> > But why should anaconda not verify packages if secure boot is disabled?
> 
> For the same reason Firefox doesn't automatically accept self-signed SSL
> certs, and the same reason that ssh doesn't automatically accept new
> host keys: it'd be creating trust from thin air.

If Firefox encounters an SSL certificate that it can't verify, then it
stops and refuses to load the web page. It won't proceed unless you
tell it that you have checked the certificate manually and found it to
be genuine.

If OpenSSH encounters a host key that it hasn't seen before, then (in
the default configuration) it stops and refuses to log in to the server.
It won't proceed unless you tell it that you have checked the host key
manually and found it to be genuine.

If Anaconda can't verify the package signing key, does it stop and
refuse to install the packages? No, it goes ahead and downloads some
random junk from somewhere on the Web and installs it. Random junk?
Yes. It doesn't verify the packages, so it has no reason to believe
that they aren't random junk.

Anaconda shouldn't proceed unless you tell it that you have checked the
boot image manually and found it to be genuine. This could be done with
a button that you have to clik on, labeled "Yes I checked the boot
image." Or the fact that you booted the boot image could be taken to
mean that you trust the boot image.

Björn Persson

Attachment: signature.asc
Description: PGP signature

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to