"Poul-Henning Kamp" <p...@phk.freebsd.dk> writes:
> "Dag-Erling Smørgrav" <d...@des.no> writes:
> > Your suggestion does not remove implicit and possibly misplaced
> > trust, it just moves it from one place to another.  Instead of
> > trusting a certificate authority and DNS, you trust the source of
> > the public key, and probably also DNS.  As always, it boils down to
> > a) key distribution is hard and b) what's your threat model?
> I don't think I agree with any of that ?
>
> With respect to authenticity of the FreeBSD SVN repo I cannot imagine
> anybody else being even one percent as qualified and trustworth as the
> FreeBSD projects own core-team.  [...]

Let me rephrase: it's not just the source of the key or certificate, but
the path from that source to you.  There is *always* some level of blind
trust, and all your suggestion does is move it from one place to
another.  You trust the certificate because you trust the PGP key that
was used to sign it, but why do you trust the key?  Did someone you know
personally vouch for it?  Do you trust them?  Were they present when the
key was generated, or do they trust it because someone *they* trust told
them it was genuine?  Does your trust in whomever gave you the key
translate to those they trust?  Is there a bottom to this pit?

The bottom line is, once again, that key distribution is hard, and that
you shouldn't make infosec decisions without having at least a vague
outline of a threat model.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to