Am 28.04.2010 19:18, schrieb Denis A. Altoé Falqueto:
> I was thinking about this problem for sometime and the more complex
> part is the key distribution and trusting. Now I maybe came to
> something usefull.

Finally, someone realizes that. The distrubution and trusting of keys is
in fact the most difficult problem we are faced with.

> I'm thinking about a two way signing process. The dev signs the
> package and send it to the server. The server would have a script or a
> cron job to verify if the signature is valid and is from someone
> trusted [1]. If so, the original signature is discarded and a new one
> is made, with an official Arch key.

Unacceptable. Servers get compromised way too easily (it happened in the
past, and it may happen again). We'd have to store the key without a
passphrase on that server for this to work. I'll never support such an
approach.


We must have a system that allows pacman to automatically verify new
developer keys and revoke old ones ... even more important, revoke them
in a way that signatures made before a certain date are still accepted,
but newer ones aren't.
I don't see this easily being implemented with PGP-Keys, but maybe
someone else knows more.

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to