On Wed, Sep 05, 2007 at 01:31:06AM +0200, Cyril Brulebois wrote:

> What about the following? An Application Manager asks his/hers New
> Maintainer applicant to sign the source packages, or more generally one
> provides source packages on ones website, and publish the key with which
> they were signed. (See also <http://mentors.debian.net>.) Doesn't the
> current behaviour exactly fit these purposes?

Ah, ok, I probably misunderstood it's purpose then if it doesn't
intend to verify that it's signed by a DD.

However, it still fails to do what you describe: The .dsc can be
signed by *anyone* whose key I happen to have in my keyring, not only
by the person in the Maintainer: field, without giving any clue to
whose signature the .dsc has. I can't think what that's good for.

> > 1. Download the public key of Adam Attacker.
> 
> Then it would be considered a user-assisted security hole at most, don't
> you think?

Well, many email clients automatically download the key that is needed
to verify a signature. The fact that a key exists in the public key
ring doesn't imply any trust at all.

        Sami

Attachment: signature.asc
Description: Digital signature

Reply via email to