LuKreme wrote:
> On 11-Dec-2008, at 07:39, Bowie Bailey wrote:
> > 
> > It's almost like "Just download this key file and you'll be fine.
> > Don't worry about where it came from, just put it in your keyring."
> 
> Not at all, I KNOW where the gpg.key came from, because I downloaded
> it.  And it came from the same server as the rules are coming.
> 
> > The point is that at some point you have to trust the source to
> > give you the correct information.  (Which, in the case of an
> > encryption key or key id, will look like a bunch of random numbers)
> 
> The KeyID is coming from who knows where.

the KeyID came from the original announcement of the ruleset by the
author.  This is currently hosted on his blog.

http://taint.org/2007/08/15/004348a.html


> > > > Because sa-update is designed to provide updates in a secure
> > > > way. If you want the simplest way, you can ignore these steps
> > > > and face the consequences when something goes wrong.
> > > 
> > > Oddly enough, I am able to encrypt emails, sign emails, verify
> > > signed mails,  login to ssh ports on remote servers and do a
> > > whole host of secure things without ever having encountered
> > > anything like this gpgkey.  I've added the key to the keychain as
> > > a trusted key, that is enough to make it secure.  How is this 8
> > > digit hex code making anything any more secure?
> > 
> > Because it specifies WHICH key in your keyring is allowed to sign
> > the updates.
> 
> So the concern is that someone who produces RULES1 for SA would hijack
> RULES2's server and then create a new RULES2 set, sign it with their
> RULES1 key, and wait for people to sync up with it?  Because it would
> require all of that, right?
> 
> Probability seems low.

If you know that the updates will only ever be signed by one key, why
not specify it?  It doesn't cost you anything and gives a slight
increase in the security level even if it is unlikely anyone would
attempt to fake an update.

-- 
Bowie

Reply via email to