Re: GPG verification of apt packages

2021-02-04 Thread Clément Hermann
On 03/02/2021 21:50, Ramin Doe wrote: > It's not entirely clear to me what the CIS guideline was expecting me to > do. It says: > >     Verify GPG keys are configured correctly for your package manager: >     # apt-key list > > Perhaps they want me to install apt-key, and use it to look at the

Re: GPG verification of apt packages

2021-01-28 Thread Clément Hermann
Hi, On 28/01/2021 19:08, Ramin Doe wrote: > "Currently there are two different implementations for signing > individual packages..." > I think this is referring to the GPG signature verification mechanisms > that are disabled by default. I'm happy to not try to not go down the > route of enabling

Re: Wheezy missing DigiCert Root G2

2017-12-12 Thread Clément Hermann
On 12/12/2017 16:25, t...@tomputer.nl wrote: > Hello, > > I just noticed that my Debian Wheezy server is missing a few Digicert > Root certificates: > > > Wheezy: > * DigiCert_Assured_ID_Root_CA.crt > * DigiCert_Global_Root_CA.crt > * DigiCert_High_Assurance_EV_Root_CA.crt > > Jessie: > * DigiC

Re: Is packages build without verifying the source package signatures?

2017-12-03 Thread Clément Hermann
On 03/12/2017 12:40, Holger Levsen wrote: > On Sun, Dec 03, 2017 at 12:05:51PM +0100, Bastian Blank wrote: >>> in practice, this also has obvious flaws. >> Please elaborate. > > for a start: one only needs to compromise one machine instead of many... > >>>

Re: DSA for CVE-2016-5696 (off-path blind TCP session attack)

2016-08-12 Thread Clément Hermann
Le 12/08/2016 à 17:46, Jakub Wilk a écrit : > * Salvatore Bonaccorso , 2016-08-12, 17:35: >> mitigation could be used as per https://lwn.net/Articles/696868/ . > > This is behind paywall at the moment. The relevant part appears to be: > >> there is a mitigation available in the form of the >> tcp