On Wed, 21 Feb 2018 10:10:30 +0100

> I know this is a little bit farfetched, pardon my ignorence, but
> OpenBSD seeems vulnerable on first installation. In case of DNS
> poisoning, what can stop a virus from forwarding the installer to a
> false SHA256.sig and false repository? My guess would be to use
> DNSSEC and a local copy of an OpenBSD repository to avoid such issue. 
> 

If you boot an unverified iso, then what is to stop it replacing your
bios?

Authentication is always boot strapped by manual processes, including
your resolver key! Also DNSSEC is rarely used and mostly RSA 1024 bit.

ecdsa will hopefully get more adoption than RSA has depite I believe
persisting to enable amplification albeit to a far smaller degree.

T-shirts of keys were made and can be found in various places including
youtube, worn by developers etc., so that you can verify the iso file
before booting it.

Reply via email to