[Yum] gpg public keys
R P Herrold
herrold at owlriver.com
Fri Mar 7 14:36:17 UTC 2003
On 6 Mar 2003, seth vidal wrote:
> > I don't see it -- this complexifies a simple design --
> good word.
... the question is who is in charge -- you or the language.
I like to think that language serves me <grin>
> > 1. Why re-invent the wheel in yum for a key import task which
> > rpm already does?
> I think the general idea I've had is to discourage people from using rpm
> so they never learn of evil commands like --nodeps and --force
Good issue, but the solution you seek is not here in yum.
There is an infinite supply of indifference to sage advice,
and ignorance to boot.
> So if they do a lot of functions through yum then they stop thinking
> about it through other interfaces. It's sorta like how no one uses dpkg
> for installations.
ummm ... There is another way than dpkg? <grin>
> now all I need to find out is if I can specify only certain pubkeys to
> be used during checking.
> That'd be terribly handy.
I don't see the handiness of key scope restriction -- Why do
you think so? It sounds like another 'complexification' with
no clear mandate.
The discussion on key revocation is warming up over on the
fedora-devel list as well, where I have been pushing yum.
There is the 'paranoid' group, of which I am a member, and the
'we'll solve that later' group.
RPM has no clear mechanism for key revocation post-processing
-- assume a key is revoked; there is no mechanism for periodic
recheck by RPM that a signed package is still signed by a
trusted key; even if there was, there is not, and simply
cannot be a 'complete' "roll-back" mechanism to revert out
arbitrary content. People who think complete roll-backs are
or will _ever_ be always possible have not thought it through.
Further, there is no mechanisn for learning of a revocation.
RPM is not cronned -- rpm can be running standalone on a host
consciously isolated from ever attaining direct external
access to a PKI on the insecure internet or in an intranet.
I admin such hosts, and they update against private mirrors
which hold content, the availability of which I have expressly
approved. This isolation is functionally required with some
parts of HIPAA and Gramm-Leach-Bliley implementations; it is
required for effective change control and management.
- Russ Herrold
.-- -... ---.. ... -.- -.-- |
Copyright (C) 2003 R P Herrold | Owl River Company
herrold at owlriver.com NIC: RPH5 (US) | "The World is Open to Linux (tm)"
My words are not deathless prose, | Open Source LINUX solutions ...
but they are mine. | info at owlriver.com -- Columbus, OH
gpg --keyserver pgp.mit.edu --recv-key 0x7BFB98B9
gpg --list-keys 2> /dev/null | grep 7BFB98B9
More information about the Yum