[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: signatures for debs installed manually



On Tue, 8 Sep 2009 12:01:09 +1000
Morgan Storey <me@morganstorey.com> wrote:

> Hi Celejar,
> 
> You can get him to PGP/GPG sign the package, then just verify it with
> his public key, or simply mdsum and sha1sum the package. There are MD5
> collisions so someone could make a package of the same size with the
> same md5 hash that contains different malicious code but for your
> needs it should be enough.
> Obviously the safest out of all of these is the PGP/GPG but the MD5
> and sha1 are easier to implement. In this case below I don't know the
> procedures but the developer will probably have a GPG key that he can
> sign the package with, then just get his public key of a key server
> and verify.

Thanks.  I know that there are ways to do this, but I was wondering if
the developer needs to be asked in each case, or if there's some sort
of standard procedure that is followed.

Celejar
-- 
mailmin.sourceforge.net - remote access via secure (OpenPGP) email
ssuds.sourceforge.net - A Simple Sudoku Solver and Generator


Reply to: